CVE-2025-68261
BaseFortify
Publication date: 2025-12-16
Last updated on: 2025-12-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a race condition in the Linux kernel's ext4 filesystem code. Specifically, it occurs because the function ext4_destroy_inline_data_nolock() modifies inode data layout without proper synchronization, while another thread may simultaneously call ext4_map_blocks() which relies on the inode's data layout flags. Without the i_data_sem lock protection, ext4_ind_map_blocks() can be called with inconsistent inode state, causing a kernel BUG and potential system crash.
How can this vulnerability impact me? :
This vulnerability can cause a kernel crash (kernel BUG) leading to filesystem unmounting and system instability. It may result in data loss or denial of service due to the kernel panic triggered by the race condition in ext4 filesystem operations.