๐Ÿ” CVE Alert

CVE-2025-38701

UNKNOWN 0.0

ext4: do not BUG when INLINE_DATA_FL lacks system.data xattr

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: ext4: do not BUG when INLINE_DATA_FL lacks system.data xattr A syzbot fuzzed image triggered a BUG_ON in ext4_update_inline_data() when an inode had the INLINE_DATA_FL flag set but was missing the system.data extended attribute. Since this can happen due to a maiciouly fuzzed file system, we shouldn't BUG, but rather, report it as a corrupted file system. Add similar replacements of BUG_ON with EXT4_ERROR_INODE() ii ext4_create_inline_data() and ext4_inline_data_truncate().

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Sep 4, 2025
Last Updated May 12, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
67cf5b09a46f72e048501b84996f2f77bc42e947 < 8085a7324d8ec448c4a764af7853e19bbd64e17a 67cf5b09a46f72e048501b84996f2f77bc42e947 < 1199a6399895f4767f0b9a68a6ff47c3f799b7c7 67cf5b09a46f72e048501b84996f2f77bc42e947 < 7f322c12df7aeed1755acd3c6fab48c7807795fb 67cf5b09a46f72e048501b84996f2f77bc42e947 < 2817ac83cb4732597bf36853fe13ca616f4ee4e2 67cf5b09a46f72e048501b84996f2f77bc42e947 < d960f4b793912f35e9d72bd9d1e90553063fcbf1 67cf5b09a46f72e048501b84996f2f77bc42e947 < 81e7e2e7ba07e7c8cdce43ccad2f91adbc5a919c 67cf5b09a46f72e048501b84996f2f77bc42e947 < 279c87ef7b9da34f65c2e4db586e730b667a6fb9 67cf5b09a46f72e048501b84996f2f77bc42e947 < 8a6f89d42e61788605722dd9faf98797c958a7e5 67cf5b09a46f72e048501b84996f2f77bc42e947 < 099b847ccc6c1ad2f805d13cfbcc83f5b6d4bc42
Linux / Linux
3.8

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/8085a7324d8ec448c4a764af7853e19bbd64e17a git.kernel.org: https://git.kernel.org/stable/c/1199a6399895f4767f0b9a68a6ff47c3f799b7c7 git.kernel.org: https://git.kernel.org/stable/c/7f322c12df7aeed1755acd3c6fab48c7807795fb git.kernel.org: https://git.kernel.org/stable/c/2817ac83cb4732597bf36853fe13ca616f4ee4e2 git.kernel.org: https://git.kernel.org/stable/c/d960f4b793912f35e9d72bd9d1e90553063fcbf1 git.kernel.org: https://git.kernel.org/stable/c/81e7e2e7ba07e7c8cdce43ccad2f91adbc5a919c git.kernel.org: https://git.kernel.org/stable/c/279c87ef7b9da34f65c2e4db586e730b667a6fb9 git.kernel.org: https://git.kernel.org/stable/c/8a6f89d42e61788605722dd9faf98797c958a7e5 git.kernel.org: https://git.kernel.org/stable/c/099b847ccc6c1ad2f805d13cfbcc83f5b6d4bc42 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-082556.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-032379.html