CVE-2025-39835
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
16/09/2025
Last modified:
16/01/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
xfs: do not propagate ENODATA disk errors into xattr code<br />
<br />
ENODATA (aka ENOATTR) has a very specific meaning in the xfs xattr code;<br />
namely, that the requested attribute name could not be found.<br />
<br />
However, a medium error from disk may also return ENODATA. At best,<br />
this medium error may escape to userspace as "attribute not found"<br />
when in fact it&#39;s an IO (disk) error.<br />
<br />
At worst, we may oops in xfs_attr_leaf_get() when we do:<br />
<br />
error = xfs_attr_leaf_hasname(args, &bp);<br />
if (error == -ENOATTR) {<br />
xfs_trans_brelse(args->trans, bp);<br />
return error;<br />
}<br />
<br />
because an ENODATA/ENOATTR error from disk leaves us with a null bp,<br />
and the xfs_trans_brelse will then null-deref it.<br />
<br />
As discussed on the list, we really need to modify the lower level<br />
IO functions to trap all disk errors and ensure that we don&#39;t let<br />
unique errors like this leak up into higher xfs functions - many<br />
like this should be remapped to EIO.<br />
<br />
However, this patch directly addresses a reported bug in the xattr<br />
code, and should be safe to backport to stable kernels. A larger-scope<br />
patch to handle more unique errors at lower levels can follow later.<br />
<br />
(Note, prior to 07120f1abdff we did not oops, but we did return the<br />
wrong error code to userspace.)
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.9 (including) | 5.10.242 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.191 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.150 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.104 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.45 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.16.5 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.17:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.17:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.17:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/157ddfb05961c68ab7d457a462822a698e4e4bf4
- https://git.kernel.org/stable/c/39fc2742ca14f7fbc621ce9b43bcbd00248cb9a8
- https://git.kernel.org/stable/c/90bae69c2959c39912f0c2f07a9a7894f3fc49f5
- https://git.kernel.org/stable/c/ae668cd567a6a7622bc813ee0bb61c42bed61ba7
- https://git.kernel.org/stable/c/d3cc7476b89fb45b7e00874f4f56f6b928467c60
- https://git.kernel.org/stable/c/dcdf36f1b67884c722abce9b8946e34ffb9f67c8
- https://git.kernel.org/stable/c/e358d4b6225e4c1eb208686a05e360ef8df59e07
- https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html
- https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html



