{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-68261","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2025-12-16T13:41:40.267Z","datePublished":"2025-12-16T14:45:03.252Z","dateUpdated":"2026-05-11T21:49:57.227Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T21:49:57.227Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\next4: add i_data_sem protection in ext4_destroy_inline_data_nolock()\n\nFix a race between inline data destruction and block mapping.\n\nThe function ext4_destroy_inline_data_nolock() changes the inode data\nlayout by clearing EXT4_INODE_INLINE_DATA and setting EXT4_INODE_EXTENTS.\nAt the same time, another thread may execute ext4_map_blocks(), which\ntests EXT4_INODE_EXTENTS to decide whether to call ext4_ext_map_blocks()\nor ext4_ind_map_blocks().\n\nWithout i_data_sem protection, ext4_ind_map_blocks() may receive inode\nwith EXT4_INODE_EXTENTS flag and triggering assert.\n\nkernel BUG at fs/ext4/indirect.c:546!\nEXT4-fs (loop2): unmounting filesystem.\ninvalid opcode: 0000 [#1] PREEMPT SMP KASAN NOPTI\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014\nRIP: 0010:ext4_ind_map_blocks.cold+0x2b/0x5a fs/ext4/indirect.c:546\n\nCall Trace:\n <TASK>\n ext4_map_blocks+0xb9b/0x16f0 fs/ext4/inode.c:681\n _ext4_get_block+0x242/0x590 fs/ext4/inode.c:822\n ext4_block_write_begin+0x48b/0x12c0 fs/ext4/inode.c:1124\n ext4_write_begin+0x598/0xef0 fs/ext4/inode.c:1255\n ext4_da_write_begin+0x21e/0x9c0 fs/ext4/inode.c:3000\n generic_perform_write+0x259/0x5d0 mm/filemap.c:3846\n ext4_buffered_write_iter+0x15b/0x470 fs/ext4/file.c:285\n ext4_file_write_iter+0x8e0/0x17f0 fs/ext4/file.c:679\n call_write_iter include/linux/fs.h:2271 [inline]\n do_iter_readv_writev+0x212/0x3c0 fs/read_write.c:735\n do_iter_write+0x186/0x710 fs/read_write.c:861\n vfs_iter_write+0x70/0xa0 fs/read_write.c:902\n iter_file_splice_write+0x73b/0xc90 fs/splice.c:685\n do_splice_from fs/splice.c:763 [inline]\n direct_splice_actor+0x10f/0x170 fs/splice.c:950\n splice_direct_to_actor+0x33a/0xa10 fs/splice.c:896\n do_splice_direct+0x1a9/0x280 fs/splice.c:1002\n do_sendfile+0xb13/0x12c0 fs/read_write.c:1255\n __do_sys_sendfile64 fs/read_write.c:1323 [inline]\n __se_sys_sendfile64 fs/read_write.c:1309 [inline]\n __x64_sys_sendfile64+0x1cf/0x210 fs/read_write.c:1309\n do_syscall_x64 arch/x86/entry/common.c:51 [inline]\n do_syscall_64+0x35/0x80 arch/x86/entry/common.c:81\n entry_SYSCALL_64_after_hwframe+0x6e/0xd8"}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["fs/ext4/inline.c"],"versions":[{"version":"c755e251357a0cee0679081f08c3f4ba797a8009","lessThan":"b322bac9f01d03190b5abc52be5d9dd9f22a2b41","status":"affected","versionType":"git"},{"version":"c755e251357a0cee0679081f08c3f4ba797a8009","lessThan":"61e03dc3794ebf77a706b85e5a36c9c6d70be6de","status":"affected","versionType":"git"},{"version":"c755e251357a0cee0679081f08c3f4ba797a8009","lessThan":"5b266cf6851ce72b11b067fe02adf5a8687104ad","status":"affected","versionType":"git"},{"version":"c755e251357a0cee0679081f08c3f4ba797a8009","lessThan":"144c48da33a01d92995aeccd8208eb47d2a8e659","status":"affected","versionType":"git"},{"version":"c755e251357a0cee0679081f08c3f4ba797a8009","lessThan":"22a76b0861ae61a299c8e126c1aca8c4fda820fd","status":"affected","versionType":"git"},{"version":"c755e251357a0cee0679081f08c3f4ba797a8009","lessThan":"ba8aeff294ac7ff6dfe293663d815c54c5ee218c","status":"affected","versionType":"git"},{"version":"c755e251357a0cee0679081f08c3f4ba797a8009","lessThan":"5cad18e527ba8a9ca5463cc170073eeb5a4826f4","status":"affected","versionType":"git"},{"version":"c755e251357a0cee0679081f08c3f4ba797a8009","lessThan":"0cd8feea8777f8d9b9a862b89c688b049a5c8475","status":"affected","versionType":"git"},{"version":"3e96c3fdcfccb321a9e1623f78cc71b44593e965","status":"affected","versionType":"git"},{"version":"5781ac24bbd998ebb1ff30143bb06244d847af48","status":"affected","versionType":"git"},{"version":"9b06cce3ca4d60d442c39bfa7c058b71b1cee6c2","status":"affected","versionType":"git"},{"version":"da1e40237f8f3516581b534c484c236a79ccfd14","status":"affected","versionType":"git"},{"version":"7cf6b709b6412afd1d93b2c4b37163c3602e3b95","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["fs/ext4/inline.c"],"versions":[{"version":"4.11","status":"affected"},{"version":"0","lessThan":"4.11","status":"unaffected","versionType":"semver"},{"version":"5.10.248","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.198","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.160","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.6.120","lessThanOrEqual":"6.6.*","status":"unaffected","versionType":"semver"},{"version":"6.12.62","lessThanOrEqual":"6.12.*","status":"unaffected","versionType":"semver"},{"version":"6.17.12","lessThanOrEqual":"6.17.*","status":"unaffected","versionType":"semver"},{"version":"6.18.1","lessThanOrEqual":"6.18.*","status":"unaffected","versionType":"semver"},{"version":"6.19","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.11","versionEndExcluding":"5.10.248"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.11","versionEndExcluding":"5.15.198"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.11","versionEndExcluding":"6.1.160"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.11","versionEndExcluding":"6.6.120"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.11","versionEndExcluding":"6.12.62"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.11","versionEndExcluding":"6.17.12"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.11","versionEndExcluding":"6.18.1"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.11","versionEndExcluding":"6.19"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.16.44"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.18.107"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.4.129"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.9.14"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.10.2"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/b322bac9f01d03190b5abc52be5d9dd9f22a2b41"},{"url":"https://git.kernel.org/stable/c/61e03dc3794ebf77a706b85e5a36c9c6d70be6de"},{"url":"https://git.kernel.org/stable/c/5b266cf6851ce72b11b067fe02adf5a8687104ad"},{"url":"https://git.kernel.org/stable/c/144c48da33a01d92995aeccd8208eb47d2a8e659"},{"url":"https://git.kernel.org/stable/c/22a76b0861ae61a299c8e126c1aca8c4fda820fd"},{"url":"https://git.kernel.org/stable/c/ba8aeff294ac7ff6dfe293663d815c54c5ee218c"},{"url":"https://git.kernel.org/stable/c/5cad18e527ba8a9ca5463cc170073eeb5a4826f4"},{"url":"https://git.kernel.org/stable/c/0cd8feea8777f8d9b9a862b89c688b049a5c8475"}],"title":"ext4: add i_data_sem protection in ext4_destroy_inline_data_nolock()","x_generator":{"engine":"bippy-1.2.0"}}}}