-
CVE-2025-38626
- EPSS 0.03%
- Published 22.08.2025 16:00:34
- Last modified 22.08.2025 18:08:51
- Source 416baaa9-dc9f-4396-8d5f-8c081f
- Teams watchlist Login
- Open Login
In the Linux kernel, the following vulnerability has been resolved: f2fs: fix to trigger foreground gc during f2fs_map_blocks() in lfs mode w/ "mode=lfs" mount option, generic/299 will cause system panic as below: ------------[ cut here ]------------ kernel BUG at fs/f2fs/segment.c:2835! Call Trace: <TASK> f2fs_allocate_data_block+0x6f4/0xc50 f2fs_map_blocks+0x970/0x1550 f2fs_iomap_begin+0xb2/0x1e0 iomap_iter+0x1d6/0x430 __iomap_dio_rw+0x208/0x9a0 f2fs_file_write_iter+0x6b3/0xfa0 aio_write+0x15d/0x2e0 io_submit_one+0x55e/0xab0 __x64_sys_io_submit+0xa5/0x230 do_syscall_64+0x84/0x2f0 entry_SYSCALL_64_after_hwframe+0x76/0x7e RIP: 0010:new_curseg+0x70f/0x720 The root cause of we run out-of-space is: in f2fs_map_blocks(), f2fs may trigger foreground gc only if it allocates any physical block, it will be a little bit later when there is multiple threads writing data w/ aio/dio/bufio method in parallel, since we always use OPU in lfs mode, so f2fs_map_blocks() does block allocations aggressively. In order to fix this issue, let's give a chance to trigger foreground gc in prior to block allocation in f2fs_map_blocks().
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
≫
Product
Linux
Default Statusunaffected
Version <
f289690f50a01c3e085d87853392d5b7436a4cee
Version
36abef4e796d382e81a0c2d21ea5327481dd7154
Status
affected
Version <
82765ce5c7a56f9309ee45328e763610eaf11253
Version
36abef4e796d382e81a0c2d21ea5327481dd7154
Status
affected
Version <
264ede8a52f18647ed5bb5f2bd9bf54f556ad8f5
Version
36abef4e796d382e81a0c2d21ea5327481dd7154
Status
affected
Version <
385e64a0744584397b4b52b27c96703516f39968
Version
36abef4e796d382e81a0c2d21ea5327481dd7154
Status
affected
Version <
1005a3ca28e90c7a64fa43023f866b960a60f791
Version
36abef4e796d382e81a0c2d21ea5327481dd7154
Status
affected
VendorLinux
≫
Product
Linux
Default Statusaffected
Version
4.8
Status
affected
Version <
4.8
Version
0
Status
unaffected
Version <=
6.6.*
Version
6.6.102
Status
unaffected
Version <=
6.12.*
Version
6.12.42
Status
unaffected
Version <=
6.15.*
Version
6.15.10
Status
unaffected
Version <=
6.16.*
Version
6.16.1
Status
unaffected
Version <=
*
Version
6.17-rc1
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.03% | 0.055 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|