Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      10 Top Node.js Development Companies for Enterprise-Scale Projects (2025-2026 Ranked & Reviewed)

      July 4, 2025

      12 Must-Know Cost Factors When Hiring Node.js Developers for Your Enterprise

      July 4, 2025

      Mirantis reveals Lens Prism, an AI copilot for operating Kubernetes clusters

      July 3, 2025

      Avoid these common platform engineering mistakes

      July 3, 2025

      Just days after joining Game Pass, the Xbox PC edition of Call of Duty: WW2 is taken offline for “an issue”

      July 5, 2025

      Xbox layoffs and game cuts wreak havoc on talented developers and the company’s future portfolio — Weekend discussion 💬

      July 5, 2025

      Microsoft plans to revamp Recall in Windows 11 with these new features

      July 5, 2025

      This 4K OLED monitor has stereo speakers that follow you — but it’s missing something “imPORTant”

      July 5, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Flaget – new small 5kB CLI argument parser

      July 5, 2025
      Recent

      Flaget – new small 5kB CLI argument parser

      July 5, 2025

      The dog days of JavaScript summer

      July 4, 2025

      Databricks Lakebase – Database Branching in Action

      July 4, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Just days after joining Game Pass, the Xbox PC edition of Call of Duty: WW2 is taken offline for “an issue”

      July 5, 2025
      Recent

      Just days after joining Game Pass, the Xbox PC edition of Call of Duty: WW2 is taken offline for “an issue”

      July 5, 2025

      Xbox layoffs and game cuts wreak havoc on talented developers and the company’s future portfolio — Weekend discussion 💬

      July 5, 2025

      Microsoft plans to revamp Recall in Windows 11 with these new features

      July 5, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Security»Common Vulnerabilities and Exposures (CVEs)»CVE-2025-38222 – Linux ext4 Inline Data Overflow

    CVE-2025-38222 – Linux ext4 Inline Data Overflow

    July 4, 2025

    CVE ID : CVE-2025-38222

    Published : July 4, 2025, 2:15 p.m. | 4 hours, 57 minutes ago

    Description : In the Linux kernel, the following vulnerability has been resolved:

    ext4: inline: fix len overflow in ext4_prepare_inline_data

    When running the following code on an ext4 filesystem with inline_data
    feature enabled, it will lead to the bug below.

    fd = open(“file1”, O_RDWR | O_CREAT | O_TRUNC, 0666);
    ftruncate(fd, 30);
    pwrite(fd, “a”, 1, (1UL EXT4_I(inode)->i_inline_size);

    at ext4_write_inline_data.

    Fix it by using a loff_t type for the len parameter in
    ext4_prepare_inline_data instead of an unsigned int.

    [ 44.545164] ————[ cut here ]————
    [ 44.545530] kernel BUG at fs/ext4/inline.c:240!
    [ 44.545834] Oops: invalid opcode: 0000 [#1] SMP NOPTI
    [ 44.546172] CPU: 3 UID: 0 PID: 343 Comm: test Not tainted 6.15.0-rc2-00003-g9080916f4863 #45 PREEMPT(full) 112853fcebfdb93254270a7959841d2c6aa2c8bb
    [ 44.546523] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
    [ 44.546523] RIP: 0010:ext4_write_inline_data+0xfe/0x100
    [ 44.546523] Code: 3c 0e 48 83 c7 48 48 89 de 5b 41 5c 41 5d 41 5e 41 5f 5d e9 e4 fa 43 01 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc cc 0f 0b 0b 0f 1f 44 00 00 55 41 57 41 56 41 55 41 54 53 48 83 ec 20 49
    [ 44.546523] RSP: 0018:ffffb342008b79a8 EFLAGS: 00010216
    [ 44.546523] RAX: 0000000000000001 RBX: ffff9329c579c000 RCX: 0000010000000006
    [ 44.546523] RDX: 000000000000003c RSI: ffffb342008b79f0 RDI: ffff9329c158e738
    [ 44.546523] RBP: 0000000000000001 R08: 0000000000000001 R09: 0000000000000000
    [ 44.546523] R10: 00007ffffffff000 R11: ffffffff9bd0d910 R12: 0000006210000000
    [ 44.546523] R13: fffffc7e4015e700 R14: 0000010000000005 R15: ffff9329c158e738
    [ 44.546523] FS: 00007f4299934740(0000) GS:ffff932a60179000(0000) knlGS:0000000000000000
    [ 44.546523] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
    [ 44.546523] CR2: 00007f4299a1ec90 CR3: 0000000002886002 CR4: 0000000000770eb0
    [ 44.546523] PKRU: 55555554
    [ 44.546523] Call Trace:
    [ 44.546523]
    [ 44.546523] ext4_write_inline_data_end+0x126/0x2d0
    [ 44.546523] generic_perform_write+0x17e/0x270
    [ 44.546523] ext4_buffered_write_iter+0xc8/0x170
    [ 44.546523] vfs_write+0x2be/0x3e0
    [ 44.546523] __x64_sys_pwrite64+0x6d/0xc0
    [ 44.546523] do_syscall_64+0x6a/0xf0
    [ 44.546523] ? __wake_up+0x89/0xb0
    [ 44.546523] ? xas_find+0x72/0x1c0
    [ 44.546523] ? next_uptodate_folio+0x317/0x330
    [ 44.546523] ? set_pte_range+0x1a6/0x270
    [ 44.546523] ? filemap_map_pages+0x6ee/0x840
    [ 44.546523] ? ext4_setattr+0x2fa/0x750
    [ 44.546523] ? do_pte_missing+0x128/0xf70
    [ 44.546523] ? security_inode_post_setattr+0x3e/0xd0
    [ 44.546523] ? ___pte_offset_map+0x19/0x100
    [ 44.546523] ? handle_mm_fault+0x721/0xa10
    [ 44.546523] ? do_user_addr_fault+0x197/0x730
    [ 44.546523] ? do_syscall_64+0x76/0xf0
    [ 44.546523] ? arch_exit_to_user_mode_prepare+0x1e/0x60
    [ 44.546523] ? irqentry_exit_to_user_mode+0x79/0x90
    [ 44.546523] entry_SYSCALL_64_after_hwframe+0x55/0x5d
    [ 44.546523] RIP: 0033:0x7f42999c6687
    [ 44.546523] Code: 48 89 fa 4c 89 df e8 58 b3 00 00 8b 93 08 03 00 00 59 5e 48 83 f8 fc 74 1a 5b c3 0f 1f 84 00 00 00 00 00 48 8b 44 24 10 0f 05 c3 0f 1f 80 00 00 00 00 83 e2 39 83 fa 08 75 de e8 23 ff ff ff
    [ 44.546523] RSP: 002b:00007ffeae4a7930 EFLAGS: 00000202 ORIG_RAX: 0000000000000012
    [ 44.546523] RAX: ffffffffffffffda RBX: 00007f4299934740 RCX: 00007f42999c6687
    [ 44.546523] RDX: 0000000000000001 RSI: 000055ea6149200f RDI: 0000000000000003
    [ 44.546523] RBP: 00007ffeae4a79a0 R08: 0000000000000000 R09: 0000000000000000
    [ 44.546523] R10: 0000010000000005 R11: 0000000000000202 R12: 0000
    —truncated—

    Severity: 0.0 | NA

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleCVE-2025-38223 – Ceph: Kernel BUG on encrypted inode with unaligned file size
    Next Article CVE-2025-38221 – Linux Kernel ext4 Out-of-Bounds Punch Offset Vulnerability

    Related Posts

    Development

    Citrix Releases Emergency Patches for Actively Exploited CVE-2025-6543 in NetScaler ADC

    July 5, 2025
    Development

    CISA Adds 3 Flaws to KEV Catalog, Impacting AMI MegaRAC, D-Link, Fortinet

    July 5, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    CVE-2025-32875 – COROS Bluetooth Pairing and Bonding Unencrypted Data Exfiltration

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-24054 Under Active Attack—Steals NTLM Credentials on File Download

    Development

    CVE-2025-3488 – WordPress WPML Stored Cross-Site Scripting Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-44880 – Wavlink WL-WN579A3 Command Injection Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Highlights

    CVE-2025-34070 – GFI Kerio Control GFIAgent Authentication Bypass

    July 2, 2025

    CVE ID : CVE-2025-34070

    Published : July 2, 2025, 2:15 p.m. | 1 hour, 1 minute ago

    Description : A missing authentication vulnerability in the GFIAgent component of GFI Kerio Control 9.4.5 allows unauthenticated remote attackers to perform privileged operations. The GFIAgent service, responsible for integration with GFI AppManager, exposes HTTP services on ports 7995 and 7996 without proper authentication. The /proxy handler on port 7996 allows arbitrary forwarding to administrative endpoints when provided with an Appliance UUID, which itself can be retrieved from port 7995. This results in a complete authentication bypass, permitting access to sensitive administrative APIs.

    Severity: 0.0 | NA

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    CVE-2025-3452 – SecuPress Free WordPress Security Plugin Unauthorized Plugin Installation Vulnerability

    April 29, 2025

    “If Ballmer was CEO, I’d be fired for this tweet.” Microsoft PM mocks Windows 11 with Katy Perry meme, praises macOS.

    April 28, 2025

    Git Apprentice [SUBSCRIBER]

    April 9, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.