Description
In the Linux kernel, the following vulnerability has been resolved:

gfs2: Fix unlikely race in gdlm_put_lock

In gdlm_put_lock(), there is a small window of time in which the
DFL_UNMOUNT flag has been set but the lockspace hasn't been released,
yet. In that window, dlm may still call gdlm_ast() and gdlm_bast().
To prevent it from dereferencing freed glock objects, only free the
glock if the lockspace has actually been released.
Published: 2025-12-04
Score: 7.0 High
EPSS: < 1% Very Low
KEV: No
Impact: Use-after-free leading to arbitrary code execution
Action: Patch Kernel
AI Analysis

Impact

In the Linux kernel a race condition was discovered in the gfs2 filesystem where the function gdlm_put_lock() could free a glock object while the lockspace was still active. The race window occurs between setting the DFL_UNMOUNT flag and releasing the lockspace, during which dlm may still invoke gdlm_ast() or gdlm_bast(). When this happens the code may dereference a freed glock, potentially leading to a crash or, if exploited, arbitrary code execution. This reflects a classic use-after-free vulnerability (CWE‑416).

Affected Systems

The vulnerability affects Linux systems running the Linux kernel. No specific version ranges were provided, so any kernel that contains the unpatched gfs2 code may be vulnerable. The affected product is the Linux kernel itself.

Risk and Exploitability

The CVSS score is 7.0, indicating medium severity. The EPSS score is less than 1 %, suggesting exploitation probability is very low at this time. The issue is not listed in CISA’s KEV catalogue. Based on the description, the likely attack vector requires local privileged access that can trigger a race, such as unmounting a GFS2 filesystem while the kernel is still holding the lockspace. An attacker who can achieve this race would immediately compromise system integrity and could obtain arbitrary code execution.

Generated by OpenCVE AI on April 20, 2026 at 17:39 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Linux kernel to a patched version that includes the gfs2 race condition fix (see the associated commit references).
  • If an immediate kernel upgrade is not possible, avoid mounting GFS2 filesystems during system shutdown or when the system is untrusted, or ensure that GFS2 is cleanly unmounted before stopping the machine to eliminate the race window.
  • Regularly monitor kernel security advisories and apply all subsequent patches to mitigate any related or new vulnerabilities.

Generated by OpenCVE AI on April 20, 2026 at 17:39 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Ubuntu USN Ubuntu USN USN-8029-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-8030-1 Linux kernel (GCP) vulnerabilities
Ubuntu USN Ubuntu USN USN-8029-2 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-8048-1 Linux kernel (OEM) vulnerabilities
Ubuntu USN Ubuntu USN USN-8029-3 Linux kernel (Azure) vulnerabilities
Ubuntu USN Ubuntu USN USN-8095-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-8095-2 Linux kernel (FIPS) vulnerabilities
Ubuntu USN Ubuntu USN USN-8100-1 Linux kernel (NVIDIA) vulnerabilities
Ubuntu USN Ubuntu USN USN-8095-3 Linux kernel (Real-time) vulnerabilities
Ubuntu USN Ubuntu USN USN-8095-4 Linux kernel (AWS) vulnerabilities
Ubuntu USN Ubuntu USN USN-8125-1 Linux kernel (Azure) vulnerabilities
Ubuntu USN Ubuntu USN USN-8126-1 Linux kernel (Azure) vulnerabilities
Ubuntu USN Ubuntu USN USN-8095-5 Linux kernel (Raspberry Pi) vulnerabilities
Ubuntu USN Ubuntu USN USN-8165-1 Linux kernel (Azure FIPS) vulnerabilities
History

Mon, 20 Apr 2026 18:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-416

Sat, 11 Apr 2026 13:00:00 +0000


Thu, 02 Apr 2026 11:45:00 +0000


Sat, 06 Dec 2025 00:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

cvssV3_1

{'score': 7.0, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}

threat_severity

Moderate


Thu, 04 Dec 2025 15:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: gfs2: Fix unlikely race in gdlm_put_lock In gdlm_put_lock(), there is a small window of time in which the DFL_UNMOUNT flag has been set but the lockspace hasn't been released, yet. In that window, dlm may still call gdlm_ast() and gdlm_bast(). To prevent it from dereferencing freed glock objects, only free the glock if the lockspace has actually been released.
Title gfs2: Fix unlikely race in gdlm_put_lock
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-04-11T12:45:40.664Z

Reserved: 2025-04-16T07:20:57.181Z

Link: CVE-2025-40242

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2025-12-04T16:16:17.390

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-40242

cve-icon Redhat

Severity : Moderate

Publid Date: 2025-12-04T00:00:00Z

Links: CVE-2025-40242 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T17:45:12Z

Weaknesses