CVE-2025-39835
BaseFortify
Publication date: 2025-09-16
Last updated on: 2025-11-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 5.10.244 |
| linux | linux_kernel | 6.1.153 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's xfs filesystem code involves improper handling of disk errors represented by the ENODATA (also known as ENOATTR) error code. ENODATA is supposed to indicate that a requested extended attribute (xattr) was not found. However, disk medium errors can also return ENODATA, causing the system to mistakenly treat a disk IO error as a missing attribute. This can lead to incorrect error reporting to userspace or, worse, a kernel oops (crash) due to a null pointer dereference when the code tries to release a buffer that was never properly allocated.
How can this vulnerability impact me? :
This vulnerability can cause the system to misreport disk IO errors as missing extended attributes, potentially leading to confusion or incorrect error handling in applications relying on xattr. In the worst case, it can cause a kernel crash (oops), leading to system instability or downtime.
What immediate steps should I take to mitigate this vulnerability?
Apply the patch that addresses the xfs xattr code bug to your Linux kernel. This patch prevents propagation of ENODATA disk errors into xattr code and avoids kernel oops. Backporting this patch to stable kernels is recommended. Additionally, monitor for kernel updates that include this fix and apply them promptly.