Home

Description

In the Linux kernel, the following vulnerability has been resolved: ext4: refresh inline data size before write operations The cached ei->i_inline_size can become stale between the initial size check and when ext4_update_inline_data()/ext4_create_inline_data() use it. Although ext4_get_max_inline_size() reads the correct value at the time of the check, concurrent xattr operations can modify i_inline_size before ext4_write_lock_xattr() is acquired. This causes ext4_update_inline_data() and ext4_create_inline_data() to work with stale capacity values, leading to a BUG_ON() crash in ext4_write_inline_data(): kernel BUG at fs/ext4/inline.c:1331! BUG_ON(pos + len > EXT4_I(inode)->i_inline_size); The race window: 1. ext4_get_max_inline_size() reads i_inline_size = 60 (correct) 2. Size check passes for 50-byte write 3. [Another thread adds xattr, i_inline_size changes to 40] 4. ext4_write_lock_xattr() acquires lock 5. ext4_update_inline_data() uses stale i_inline_size = 60 6. Attempts to write 50 bytes but only 40 bytes actually available 7. BUG_ON() triggers Fix this by recalculating i_inline_size via ext4_find_inline_data_nolock() immediately after acquiring xattr_sem. This ensures ext4_update_inline_data() and ext4_create_inline_data() work with current values that are protected from concurrent modifications. This is similar to commit a54c4613dac1 ("ext4: fix race writing to an inline_data file while its xattrs are changing") which fixed i_inline_off staleness. This patch addresses the related i_inline_size staleness issue.

PUBLISHED Reserved 2025-12-16 | Published 2025-12-16 | Updated 2025-12-16 | Assigner Linux

Product status

Default status
unaffected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 210ac60a86a3ad2c76ae60e0dc71c34af6e7ea0b
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before ca43ea29b4c4d2764aec8a26cffcfb677a871e6e
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 58df743faf21ceb1880f930aa5dd428e2a5e415d
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 892e1cf17555735e9d021ab036c36bc7b58b0e3b
affected

Default status
affected

6.12.62 (semver)
unaffected

6.17.12 (semver)
unaffected

6.18.1 (semver)
unaffected

6.19-rc1 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/210ac60a86a3ad2c76ae60e0dc71c34af6e7ea0b

git.kernel.org/...c/ca43ea29b4c4d2764aec8a26cffcfb677a871e6e

git.kernel.org/...c/58df743faf21ceb1880f930aa5dd428e2a5e415d

git.kernel.org/...c/892e1cf17555735e9d021ab036c36bc7b58b0e3b

cve.org (CVE-2025-68264)

nvd.nist.gov (CVE-2025-68264)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.