Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      10 Top Node.js Development Companies for Enterprise-Scale Projects (2025-2026 Ranked & Reviewed)

      July 4, 2025

      12 Must-Know Cost Factors When Hiring Node.js Developers for Your Enterprise

      July 4, 2025

      Mirantis reveals Lens Prism, an AI copilot for operating Kubernetes clusters

      July 3, 2025

      Avoid these common platform engineering mistakes

      July 3, 2025

      Microsoft Gaming studios head Matt Booty says “overall portfolio strategy is unchanged” — with more than 40 games in production

      July 3, 2025

      Capcom reports that its Steam game sales have risen massively — despite flagship titles like Monster Hunter Wilds receiving profuse backlash from PC players

      July 3, 2025

      Cloudflare is fighting to safeguard “the future of the web itself” — standing directly in the way of leading AI firms

      July 3, 2025

      Microsoft reportedly lacks the know-how to fully leverage OpenAI’s tech — despite holding IP rights

      July 3, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Laravel in the First Half of 2025

      July 4, 2025
      Recent

      Laravel in the First Half of 2025

      July 4, 2025

      PHP 8.5.0 Alpha 1 available for testing

      July 3, 2025

      Recording cross browser compatible media

      July 3, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      GOnnect – easy to use VoIP client

      July 4, 2025
      Recent

      GOnnect – easy to use VoIP client

      July 4, 2025

      Gnuinos – spin of Devuan Linux

      July 4, 2025

      5 Best Free and Open Source Backend Electronic Circuit Simulators

      July 4, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Security»Common Vulnerabilities and Exposures (CVEs)»CVE-2025-38222 – Linux ext4 Inline Data Overflow

    CVE-2025-38222 – Linux ext4 Inline Data Overflow

    July 4, 2025

    CVE ID : CVE-2025-38222

    Published : July 4, 2025, 2:15 p.m. | 4 hours, 57 minutes ago

    Description : In the Linux kernel, the following vulnerability has been resolved:

    ext4: inline: fix len overflow in ext4_prepare_inline_data

    When running the following code on an ext4 filesystem with inline_data
    feature enabled, it will lead to the bug below.

    fd = open(“file1”, O_RDWR | O_CREAT | O_TRUNC, 0666);
    ftruncate(fd, 30);
    pwrite(fd, “a”, 1, (1UL EXT4_I(inode)->i_inline_size);

    at ext4_write_inline_data.

    Fix it by using a loff_t type for the len parameter in
    ext4_prepare_inline_data instead of an unsigned int.

    [ 44.545164] ————[ cut here ]————
    [ 44.545530] kernel BUG at fs/ext4/inline.c:240!
    [ 44.545834] Oops: invalid opcode: 0000 [#1] SMP NOPTI
    [ 44.546172] CPU: 3 UID: 0 PID: 343 Comm: test Not tainted 6.15.0-rc2-00003-g9080916f4863 #45 PREEMPT(full) 112853fcebfdb93254270a7959841d2c6aa2c8bb
    [ 44.546523] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
    [ 44.546523] RIP: 0010:ext4_write_inline_data+0xfe/0x100
    [ 44.546523] Code: 3c 0e 48 83 c7 48 48 89 de 5b 41 5c 41 5d 41 5e 41 5f 5d e9 e4 fa 43 01 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc cc 0f 0b 0b 0f 1f 44 00 00 55 41 57 41 56 41 55 41 54 53 48 83 ec 20 49
    [ 44.546523] RSP: 0018:ffffb342008b79a8 EFLAGS: 00010216
    [ 44.546523] RAX: 0000000000000001 RBX: ffff9329c579c000 RCX: 0000010000000006
    [ 44.546523] RDX: 000000000000003c RSI: ffffb342008b79f0 RDI: ffff9329c158e738
    [ 44.546523] RBP: 0000000000000001 R08: 0000000000000001 R09: 0000000000000000
    [ 44.546523] R10: 00007ffffffff000 R11: ffffffff9bd0d910 R12: 0000006210000000
    [ 44.546523] R13: fffffc7e4015e700 R14: 0000010000000005 R15: ffff9329c158e738
    [ 44.546523] FS: 00007f4299934740(0000) GS:ffff932a60179000(0000) knlGS:0000000000000000
    [ 44.546523] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
    [ 44.546523] CR2: 00007f4299a1ec90 CR3: 0000000002886002 CR4: 0000000000770eb0
    [ 44.546523] PKRU: 55555554
    [ 44.546523] Call Trace:
    [ 44.546523]
    [ 44.546523] ext4_write_inline_data_end+0x126/0x2d0
    [ 44.546523] generic_perform_write+0x17e/0x270
    [ 44.546523] ext4_buffered_write_iter+0xc8/0x170
    [ 44.546523] vfs_write+0x2be/0x3e0
    [ 44.546523] __x64_sys_pwrite64+0x6d/0xc0
    [ 44.546523] do_syscall_64+0x6a/0xf0
    [ 44.546523] ? __wake_up+0x89/0xb0
    [ 44.546523] ? xas_find+0x72/0x1c0
    [ 44.546523] ? next_uptodate_folio+0x317/0x330
    [ 44.546523] ? set_pte_range+0x1a6/0x270
    [ 44.546523] ? filemap_map_pages+0x6ee/0x840
    [ 44.546523] ? ext4_setattr+0x2fa/0x750
    [ 44.546523] ? do_pte_missing+0x128/0xf70
    [ 44.546523] ? security_inode_post_setattr+0x3e/0xd0
    [ 44.546523] ? ___pte_offset_map+0x19/0x100
    [ 44.546523] ? handle_mm_fault+0x721/0xa10
    [ 44.546523] ? do_user_addr_fault+0x197/0x730
    [ 44.546523] ? do_syscall_64+0x76/0xf0
    [ 44.546523] ? arch_exit_to_user_mode_prepare+0x1e/0x60
    [ 44.546523] ? irqentry_exit_to_user_mode+0x79/0x90
    [ 44.546523] entry_SYSCALL_64_after_hwframe+0x55/0x5d
    [ 44.546523] RIP: 0033:0x7f42999c6687
    [ 44.546523] Code: 48 89 fa 4c 89 df e8 58 b3 00 00 8b 93 08 03 00 00 59 5e 48 83 f8 fc 74 1a 5b c3 0f 1f 84 00 00 00 00 00 48 8b 44 24 10 0f 05 c3 0f 1f 80 00 00 00 00 83 e2 39 83 fa 08 75 de e8 23 ff ff ff
    [ 44.546523] RSP: 002b:00007ffeae4a7930 EFLAGS: 00000202 ORIG_RAX: 0000000000000012
    [ 44.546523] RAX: ffffffffffffffda RBX: 00007f4299934740 RCX: 00007f42999c6687
    [ 44.546523] RDX: 0000000000000001 RSI: 000055ea6149200f RDI: 0000000000000003
    [ 44.546523] RBP: 00007ffeae4a79a0 R08: 0000000000000000 R09: 0000000000000000
    [ 44.546523] R10: 0000010000000005 R11: 0000000000000202 R12: 0000
    —truncated—

    Severity: 0.0 | NA

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleCVE-2025-38223 – Ceph: Kernel BUG on encrypted inode with unaligned file size
    Next Article CVE-2025-38221 – Linux Kernel ext4 Out-of-Bounds Punch Offset Vulnerability

    Related Posts

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-38221 – Linux Kernel ext4 Out-of-Bounds Punch Offset Vulnerability

    July 4, 2025
    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-38223 – Ceph: Kernel BUG on encrypted inode with unaligned file size

    July 4, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    CVE-2025-48133 – Uncanny Owl Uncanny Automator Missing Authorization Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Fast-track SOP processing using Amazon Bedrock

    Machine Learning

    You can run Arch Linux in Windows now – here’s how

    News & Updates

    CVE-2025-5252 – PHPGurukul News Portal Project SQL Injection Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Highlights

    CVE-2025-38224 – Kvaser PCIEFD Linux Kernel Slab Out-of-Bounds Write

    July 4, 2025

    CVE ID : CVE-2025-38224

    Published : July 4, 2025, 2:15 p.m. | 4 hours, 57 minutes ago

    Description : In the Linux kernel, the following vulnerability has been resolved:

    can: kvaser_pciefd: refine error prone echo_skb_max handling logic

    echo_skb_max should define the supported upper limit of echo_skb[]
    allocated inside the netdevice’s priv. The corresponding size value
    provided by this driver to alloc_candev() is KVASER_PCIEFD_CAN_TX_MAX_COUNT
    which is 17.

    But later echo_skb_max is rounded up to the nearest power of two (for the
    max case, that would be 32) and the tx/ack indices calculated further
    during tx/rx may exceed the upper array boundary. Kasan reported this for
    the ack case inside kvaser_pciefd_handle_ack_packet(), though the xmit
    function has actually caught the same thing earlier.

    BUG: KASAN: slab-out-of-bounds in kvaser_pciefd_handle_ack_packet+0x2d7/0x92a drivers/net/can/kvaser_pciefd.c:1528
    Read of size 8 at addr ffff888105e4f078 by task swapper/4/0

    CPU: 4 UID: 0 PID: 0 Comm: swapper/4 Not tainted 6.15.0 #12 PREEMPT(voluntary)
    Call Trace:

    dump_stack_lvl lib/dump_stack.c:122
    print_report mm/kasan/report.c:521
    kasan_report mm/kasan/report.c:634
    kvaser_pciefd_handle_ack_packet drivers/net/can/kvaser_pciefd.c:1528
    kvaser_pciefd_read_packet drivers/net/can/kvaser_pciefd.c:1605
    kvaser_pciefd_read_buffer drivers/net/can/kvaser_pciefd.c:1656
    kvaser_pciefd_receive_irq drivers/net/can/kvaser_pciefd.c:1684
    kvaser_pciefd_irq_handler drivers/net/can/kvaser_pciefd.c:1733
    __handle_irq_event_percpu kernel/irq/handle.c:158
    handle_irq_event kernel/irq/handle.c:210
    handle_edge_irq kernel/irq/chip.c:833
    __common_interrupt arch/x86/kernel/irq.c:296
    common_interrupt arch/x86/kernel/irq.c:286

    Tx max count definitely matters for kvaser_pciefd_tx_avail(), but for seq
    numbers’ generation that’s not the case – we’re free to calculate them as
    would be more convenient, not taking tx max count into account. The only
    downside is that the size of echo_skb[] should correspond to the max seq
    number (not tx max count), so in some situations a bit more memory would
    be consumed than could be.

    Thus make the size of the underlying echo_skb[] sufficient for the rounded
    max tx value.

    Found by Linux Verification Center (linuxtesting.org) with Syzkaller.

    Severity: 0.0 | NA

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    CVE-2025-5498 – Slackero PHPwcms Remote Deserialization Vulnerability

    June 3, 2025

    How to Clean Printer Queue in Windows 11: Easy Guide

    June 24, 2025

    CVE-2025-48881 – Valtimo Object Management Configuration Information Disclosure

    May 30, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.