CVE-2025-68261

MEDIUM
中文标题:
(暂无数据)
英文标题:
ext4: add i_data_sem protection in ext4_destroy_inline_data_nolock()
CVSS分数: -1.0
发布时间: 2025-12-16 14:45:03
漏洞类型: (暂无数据)
状态: PUBLISHED
数据质量分数: 0.40
数据版本: v4
漏洞描述
中文描述:

(暂无数据)

英文描述:

In the Linux kernel, the following vulnerability has been resolved: ext4: add i_data_sem protection in ext4_destroy_inline_data_nolock() Fix a race between inline data destruction and block mapping. The function ext4_destroy_inline_data_nolock() changes the inode data layout by clearing EXT4_INODE_INLINE_DATA and setting EXT4_INODE_EXTENTS. At the same time, another thread may execute ext4_map_blocks(), which tests EXT4_INODE_EXTENTS to decide whether to call ext4_ext_map_blocks() or ext4_ind_map_blocks(). Without i_data_sem protection, ext4_ind_map_blocks() may receive inode with EXT4_INODE_EXTENTS flag and triggering assert. kernel BUG at fs/ext4/indirect.c:546! EXT4-fs (loop2): unmounting filesystem. invalid opcode: 0000 [#1] PREEMPT SMP KASAN NOPTI Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 RIP: 0010:ext4_ind_map_blocks.cold+0x2b/0x5a fs/ext4/indirect.c:546 Call Trace: <TASK> ext4_map_blocks+0xb9b/0x16f0 fs/ext4/inode.c:681 _ext4_get_block+0x242/0x590 fs/ext4/inode.c:822 ext4_block_write_begin+0x48b/0x12c0 fs/ext4/inode.c:1124 ext4_write_begin+0x598/0xef0 fs/ext4/inode.c:1255 ext4_da_write_begin+0x21e/0x9c0 fs/ext4/inode.c:3000 generic_perform_write+0x259/0x5d0 mm/filemap.c:3846 ext4_buffered_write_iter+0x15b/0x470 fs/ext4/file.c:285 ext4_file_write_iter+0x8e0/0x17f0 fs/ext4/file.c:679 call_write_iter include/linux/fs.h:2271 [inline] do_iter_readv_writev+0x212/0x3c0 fs/read_write.c:735 do_iter_write+0x186/0x710 fs/read_write.c:861 vfs_iter_write+0x70/0xa0 fs/read_write.c:902 iter_file_splice_write+0x73b/0xc90 fs/splice.c:685 do_splice_from fs/splice.c:763 [inline] direct_splice_actor+0x10f/0x170 fs/splice.c:950 splice_direct_to_actor+0x33a/0xa10 fs/splice.c:896 do_splice_direct+0x1a9/0x280 fs/splice.c:1002 do_sendfile+0xb13/0x12c0 fs/read_write.c:1255 __do_sys_sendfile64 fs/read_write.c:1323 [inline] __se_sys_sendfile64 fs/read_write.c:1309 [inline] __x64_sys_sendfile64+0x1cf/0x210 fs/read_write.c:1309 do_syscall_x64 arch/x86/entry/common.c:51 [inline] do_syscall_64+0x35/0x80 arch/x86/entry/common.c:81 entry_SYSCALL_64_after_hwframe+0x6e/0xd8

CWE类型:
(暂无数据)
标签:
(暂无数据)
受影响产品
厂商 产品 版本 版本范围 平台 CPE
Linux Linux 3e96c3fdcfccb321a9e1623f78cc71b44593e965 - - cpe:2.3:a:linux:linux:3e96c3fdcfccb321a9e1623f78cc71b44593e965:*:*:*:*:*:*:*
Linux Linux 5781ac24bbd998ebb1ff30143bb06244d847af48 - - cpe:2.3:a:linux:linux:5781ac24bbd998ebb1ff30143bb06244d847af48:*:*:*:*:*:*:*
Linux Linux 9b06cce3ca4d60d442c39bfa7c058b71b1cee6c2 - - cpe:2.3:a:linux:linux:9b06cce3ca4d60d442c39bfa7c058b71b1cee6c2:*:*:*:*:*:*:*
Linux Linux da1e40237f8f3516581b534c484c236a79ccfd14 - - cpe:2.3:a:linux:linux:da1e40237f8f3516581b534c484c236a79ccfd14:*:*:*:*:*:*:*
Linux Linux 7cf6b709b6412afd1d93b2c4b37163c3602e3b95 - - cpe:2.3:a:linux:linux:7cf6b709b6412afd1d93b2c4b37163c3602e3b95:*:*:*:*:*:*:*
Linux Linux 4.11 - - cpe:2.3:a:linux:linux:4.11:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
416baaa9-dc9f-4396-8d5f-8c081fb06d67 OTHER
nvd.nist.gov
访问
416baaa9-dc9f-4396-8d5f-8c081fb06d67 OTHER
nvd.nist.gov
访问
416baaa9-dc9f-4396-8d5f-8c081fb06d67 OTHER
nvd.nist.gov
访问
416baaa9-dc9f-4396-8d5f-8c081fb06d67 OTHER
nvd.nist.gov
访问
CVSS评分详情
-1.0
LOW
CVSS向量: NOT_EXTRACTED
CVSS版本: NOT_EXTRACTED
机密性
N/A
完整性
N/A
可用性
N/A
时间信息
发布时间:
2025-12-16 14:45:03
修改时间:
2025-12-16 14:45:03
创建时间:
2026-01-12 02:12:29
更新时间:
2026-01-20 03:10:37
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2025-68261 2025-12-19 03:24:49 2026-01-12 02:12:29
NVD nvd_CVE-2025-68261 2025-12-19 03:25:39 2026-01-12 02:28:13
版本与语言
当前版本: v4
主要语言: EN
支持语言:
EN
安全公告
暂无安全公告信息
变更历史
v4 NVD
2026-01-20 03:10:37
references_count: 6 → 8
查看详细变更
  • references_count: 6 -> 8
v3 NVD
2026-01-12 03:36:52
references_count: 4 → 6
查看详细变更
  • references_count: 4 -> 6
v2 NVD
2026-01-12 02:28:13
data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • data_sources: ['cve'] -> ['cve', 'nvd']