Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      10 Ways Node.js Development Boosts AI & Real-Time Data (2025-2026 Edition)

      August 18, 2025

      Looking to Outsource React.js Development? Here’s What Top Agencies Are Doing Right

      August 18, 2025

      Beyond The Hype: What AI Can Really Do For Product Design

      August 18, 2025

      BrowserStack launches Chrome extension that bundles 10+ manual web testing tools

      August 18, 2025

      How much RAM does your Linux PC really need in 2025?

      August 19, 2025

      Have solar at home? Supercharge that investment with this other crucial component

      August 19, 2025

      I replaced my MacBook charger with this compact wall unit – and wish I’d done it sooner

      August 19, 2025

      5 reasons to switch to an immutable Linux distro today – and which to try first

      August 19, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Sentry Adds Logs Support for Laravel Apps

      August 19, 2025
      Recent

      Sentry Adds Logs Support for Laravel Apps

      August 19, 2025

      Efficient Context Management with Laravel’s Remember Functions

      August 19, 2025

      Laravel Devtoolbox: Your Swiss Army Knife Artisan CLI

      August 19, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      From plateau predictions to buggy rollouts — Bill Gates’ GPT-5 skepticism looks strangely accurate

      August 18, 2025
      Recent

      From plateau predictions to buggy rollouts — Bill Gates’ GPT-5 skepticism looks strangely accurate

      August 18, 2025

      We gave OpenAI’s open-source AI a kid’s test — here’s what happened

      August 18, 2025

      With GTA 6, next-gen exclusives, and a console comeback on the horizon, Xbox risks sitting on the sidelines — here’s why

      August 18, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Security»Common Vulnerabilities and Exposures (CVEs)»CVE-2025-38222 – Linux ext4 Inline Data Overflow

    CVE-2025-38222 – Linux ext4 Inline Data Overflow

    July 4, 2025

    CVE ID : CVE-2025-38222

    Published : July 4, 2025, 2:15 p.m. | 4 hours, 57 minutes ago

    Description : In the Linux kernel, the following vulnerability has been resolved:

    ext4: inline: fix len overflow in ext4_prepare_inline_data

    When running the following code on an ext4 filesystem with inline_data
    feature enabled, it will lead to the bug below.

    fd = open(“file1”, O_RDWR | O_CREAT | O_TRUNC, 0666);
    ftruncate(fd, 30);
    pwrite(fd, “a”, 1, (1UL EXT4_I(inode)->i_inline_size);

    at ext4_write_inline_data.

    Fix it by using a loff_t type for the len parameter in
    ext4_prepare_inline_data instead of an unsigned int.

    [ 44.545164] ————[ cut here ]————
    [ 44.545530] kernel BUG at fs/ext4/inline.c:240!
    [ 44.545834] Oops: invalid opcode: 0000 [#1] SMP NOPTI
    [ 44.546172] CPU: 3 UID: 0 PID: 343 Comm: test Not tainted 6.15.0-rc2-00003-g9080916f4863 #45 PREEMPT(full) 112853fcebfdb93254270a7959841d2c6aa2c8bb
    [ 44.546523] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
    [ 44.546523] RIP: 0010:ext4_write_inline_data+0xfe/0x100
    [ 44.546523] Code: 3c 0e 48 83 c7 48 48 89 de 5b 41 5c 41 5d 41 5e 41 5f 5d e9 e4 fa 43 01 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc cc 0f 0b 0b 0f 1f 44 00 00 55 41 57 41 56 41 55 41 54 53 48 83 ec 20 49
    [ 44.546523] RSP: 0018:ffffb342008b79a8 EFLAGS: 00010216
    [ 44.546523] RAX: 0000000000000001 RBX: ffff9329c579c000 RCX: 0000010000000006
    [ 44.546523] RDX: 000000000000003c RSI: ffffb342008b79f0 RDI: ffff9329c158e738
    [ 44.546523] RBP: 0000000000000001 R08: 0000000000000001 R09: 0000000000000000
    [ 44.546523] R10: 00007ffffffff000 R11: ffffffff9bd0d910 R12: 0000006210000000
    [ 44.546523] R13: fffffc7e4015e700 R14: 0000010000000005 R15: ffff9329c158e738
    [ 44.546523] FS: 00007f4299934740(0000) GS:ffff932a60179000(0000) knlGS:0000000000000000
    [ 44.546523] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
    [ 44.546523] CR2: 00007f4299a1ec90 CR3: 0000000002886002 CR4: 0000000000770eb0
    [ 44.546523] PKRU: 55555554
    [ 44.546523] Call Trace:
    [ 44.546523]
    [ 44.546523] ext4_write_inline_data_end+0x126/0x2d0
    [ 44.546523] generic_perform_write+0x17e/0x270
    [ 44.546523] ext4_buffered_write_iter+0xc8/0x170
    [ 44.546523] vfs_write+0x2be/0x3e0
    [ 44.546523] __x64_sys_pwrite64+0x6d/0xc0
    [ 44.546523] do_syscall_64+0x6a/0xf0
    [ 44.546523] ? __wake_up+0x89/0xb0
    [ 44.546523] ? xas_find+0x72/0x1c0
    [ 44.546523] ? next_uptodate_folio+0x317/0x330
    [ 44.546523] ? set_pte_range+0x1a6/0x270
    [ 44.546523] ? filemap_map_pages+0x6ee/0x840
    [ 44.546523] ? ext4_setattr+0x2fa/0x750
    [ 44.546523] ? do_pte_missing+0x128/0xf70
    [ 44.546523] ? security_inode_post_setattr+0x3e/0xd0
    [ 44.546523] ? ___pte_offset_map+0x19/0x100
    [ 44.546523] ? handle_mm_fault+0x721/0xa10
    [ 44.546523] ? do_user_addr_fault+0x197/0x730
    [ 44.546523] ? do_syscall_64+0x76/0xf0
    [ 44.546523] ? arch_exit_to_user_mode_prepare+0x1e/0x60
    [ 44.546523] ? irqentry_exit_to_user_mode+0x79/0x90
    [ 44.546523] entry_SYSCALL_64_after_hwframe+0x55/0x5d
    [ 44.546523] RIP: 0033:0x7f42999c6687
    [ 44.546523] Code: 48 89 fa 4c 89 df e8 58 b3 00 00 8b 93 08 03 00 00 59 5e 48 83 f8 fc 74 1a 5b c3 0f 1f 84 00 00 00 00 00 48 8b 44 24 10 0f 05 c3 0f 1f 80 00 00 00 00 83 e2 39 83 fa 08 75 de e8 23 ff ff ff
    [ 44.546523] RSP: 002b:00007ffeae4a7930 EFLAGS: 00000202 ORIG_RAX: 0000000000000012
    [ 44.546523] RAX: ffffffffffffffda RBX: 00007f4299934740 RCX: 00007f42999c6687
    [ 44.546523] RDX: 0000000000000001 RSI: 000055ea6149200f RDI: 0000000000000003
    [ 44.546523] RBP: 00007ffeae4a79a0 R08: 0000000000000000 R09: 0000000000000000
    [ 44.546523] R10: 0000010000000005 R11: 0000000000000202 R12: 0000
    —truncated—

    Severity: 0.0 | NA

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleCVE-2025-38223 – Ceph: Kernel BUG on encrypted inode with unaligned file size
    Next Article CVE-2025-38221 – Linux Kernel ext4 Out-of-Bounds Punch Offset Vulnerability

    Related Posts

    Development

    Workday Staff Fall to Social Engineering; Hackers Access Third-Party CRM Platform

    August 18, 2025
    Development

    Get Ready for the Black Hat USA 2025 CISO Podcast Series from The Cyber Express and Suraksha Catalyst

    August 18, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    CVE-2025-23192 – SAP BusinessObjects Business Intelligence BI Workspace Cross-Site Scripting (XSS)

    Common Vulnerabilities and Exposures (CVEs)
    Rilasciato Proxmox VE 8.4: Un aggiornamento significativo per la virtualizzazione open source

    Rilasciato Proxmox VE 8.4: Un aggiornamento significativo per la virtualizzazione open source

    Linux

    DevSecOps Phase 4B: Manual Penetration Testing

    Security

    CVE-2025-4940 – “1000 Projects Daily College Class Work Report Book SQL Injection Vulnerability”

    Common Vulnerabilities and Exposures (CVEs)

    Highlights

    CVE-2025-5356 – FreeFloat FTP Server BYE Command Handler Buffer Overflow Vulnerability

    May 30, 2025

    CVE ID : CVE-2025-5356

    Published : May 30, 2025, 5:15 p.m. | 23 minutes ago

    Description : A vulnerability was found in FreeFloat FTP Server 1.0. It has been classified as critical. Affected is an unknown function of the component BYE Command Handler. The manipulation leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

    Severity: 7.3 | HIGH

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    CVE-2025-2011 – WordPress Slider & Popup Builder by Depicter SQL Injection Vulnerability

    May 6, 2025

    Stretch Break Linux App Reminds You to Stop Pixel-Gawping

    June 3, 2025

    TurboModules & Fabric: Powering the Next Generation of High-Performance Apps⚡

    April 23, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.