CVE-2025-38222
BaseFortify
Publication date: 2025-07-04
Last updated on: 2025-12-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 3.8 (inc) to 5.4.295 (exc) |
| linux | linux_kernel | From 5.5 (inc) to 5.10.239 (exc) |
| linux | linux_kernel | From 5.11 (inc) to 5.15.186 (exc) |
| linux | linux_kernel | From 5.16 (inc) to 6.1.142 (exc) |
| linux | linux_kernel | From 6.2 (inc) to 6.6.95 (exc) |
| linux | linux_kernel | From 6.7 (inc) to 6.12.35 (exc) |
| linux | linux_kernel | From 6.13 (inc) to 6.15.4 (exc) |
| debian | debian_linux | 11.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-190 | The product performs a calculation that can produce an integer overflow or wraparound when the logic assumes that the resulting value will always be larger than the original value. This occurs when an integer value is incremented to a value that is too large to store in the associated representation. When this occurs, the value may become a very small or negative number. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a bug in the Linux kernel's ext4 filesystem when the inline_data feature is enabled. It occurs due to an integer overflow in the ext4_prepare_inline_data function, where the length parameter is truncated improperly. This causes a mismatch in expected data sizes during write operations, leading to a kernel BUG and potential system crash when writing data at a very large offset.
How can this vulnerability impact me? :
This vulnerability can cause a kernel crash (BUG) when performing certain write operations on an ext4 filesystem with inline_data enabled. This can lead to system instability or denial of service, potentially interrupting normal operations and causing data loss or corruption.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability manifests as a kernel BUG triggered by specific writes to an ext4 filesystem with the inline_data feature enabled. Detection involves monitoring kernel logs for BUG_ON messages related to ext4_write_inline_data, especially after running suspicious write operations. You can check kernel logs using commands like 'dmesg | grep ext4_write_inline_data' or 'journalctl -k | grep ext4_write_inline_data'. Additionally, testing the vulnerable code snippet on a test system with an ext4 filesystem with inline_data enabled can reproduce the bug.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves updating the Linux kernel to a version where this vulnerability is fixed, as the issue is resolved by changing the len parameter type in ext4_prepare_inline_data. If updating is not immediately possible, avoid running untrusted code that performs large offset writes on ext4 filesystems with inline_data enabled. Monitoring and restricting access to systems with ext4 inline_data enabled can also reduce risk.