๐Ÿ” CVE Alert

CVE-2025-38712

UNKNOWN 0.0

hfsplus: don't use BUG_ON() in hfsplus_create_attributes_file()

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: hfsplus: don't use BUG_ON() in hfsplus_create_attributes_file() When the volume header contains erroneous values that do not reflect the actual state of the filesystem, hfsplus_fill_super() assumes that the attributes file is not yet created, which later results in hitting BUG_ON() when hfsplus_create_attributes_file() is called. Replace this BUG_ON() with -EIO error with a message to suggest running fsck tool.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Sep 4, 2025
Last Updated May 12, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
95e0d7dbb9b28ab0dfad7c7316066b05e1f1d4cd < bb0eea8e375677f586ad11c12e2525ed3fc698c2 95e0d7dbb9b28ab0dfad7c7316066b05e1f1d4cd < 9046566fa692f88954dac8c510f37ee17a15fdb7 95e0d7dbb9b28ab0dfad7c7316066b05e1f1d4cd < 03cd1db1494cf930e2fa042c9c13e32bffdb4eba 95e0d7dbb9b28ab0dfad7c7316066b05e1f1d4cd < dee5c668ad71ddbcb4b48d95e8a4f371314ad41d 95e0d7dbb9b28ab0dfad7c7316066b05e1f1d4cd < b3359392b75395a31af739a761f48f4041148226 95e0d7dbb9b28ab0dfad7c7316066b05e1f1d4cd < 1bb8da27ff15e346d4bc9e248e819c9a88ebf9d6 95e0d7dbb9b28ab0dfad7c7316066b05e1f1d4cd < d768e3ed430e89a699bf89d3214dcbbf4648c939 95e0d7dbb9b28ab0dfad7c7316066b05e1f1d4cd < ce5e387f396cbb5c061d9837abcac731e9e06f4d 95e0d7dbb9b28ab0dfad7c7316066b05e1f1d4cd < c7c6363ca186747ebc2df10c8a1a51e66e0e32d9
Linux / Linux
3.13

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/bb0eea8e375677f586ad11c12e2525ed3fc698c2 git.kernel.org: https://git.kernel.org/stable/c/9046566fa692f88954dac8c510f37ee17a15fdb7 git.kernel.org: https://git.kernel.org/stable/c/03cd1db1494cf930e2fa042c9c13e32bffdb4eba git.kernel.org: https://git.kernel.org/stable/c/dee5c668ad71ddbcb4b48d95e8a4f371314ad41d git.kernel.org: https://git.kernel.org/stable/c/b3359392b75395a31af739a761f48f4041148226 git.kernel.org: https://git.kernel.org/stable/c/1bb8da27ff15e346d4bc9e248e819c9a88ebf9d6 git.kernel.org: https://git.kernel.org/stable/c/d768e3ed430e89a699bf89d3214dcbbf4648c939 git.kernel.org: https://git.kernel.org/stable/c/ce5e387f396cbb5c061d9837abcac731e9e06f4d git.kernel.org: https://git.kernel.org/stable/c/c7c6363ca186747ebc2df10c8a1a51e66e0e32d9 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-032379.html