-
CVE-2025-38652
- EPSS 0.05%
- Veröffentlicht 22.08.2025 16:00:56
- Zuletzt bearbeitet 28.08.2025 15:15:57
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- Teams Watchlist Login
- Unerledigt Login
In the Linux kernel, the following vulnerability has been resolved: f2fs: fix to avoid out-of-boundary access in devs.path - touch /mnt/f2fs/012345678901234567890123456789012345678901234567890123 - truncate -s $((1024*1024*1024)) \ /mnt/f2fs/012345678901234567890123456789012345678901234567890123 - touch /mnt/f2fs/file - truncate -s $((1024*1024*1024)) /mnt/f2fs/file - mkfs.f2fs /mnt/f2fs/012345678901234567890123456789012345678901234567890123 \ -c /mnt/f2fs/file - mount /mnt/f2fs/012345678901234567890123456789012345678901234567890123 \ /mnt/f2fs/loop [16937.192225] F2FS-fs (loop0): Mount Device [ 0]: /mnt/f2fs/012345678901234567890123456789012345678901234567890123\xff\x01, 511, 0 - 3ffff [16937.192268] F2FS-fs (loop0): Failed to find devices If device path length equals to MAX_PATH_LEN, sbi->devs.path[] may not end up w/ null character due to path array is fully filled, So accidently, fields locate after path[] may be treated as part of device path, result in parsing wrong device path. struct f2fs_dev_info { ... char path[MAX_PATH_LEN]; ... }; Let's add one byte space for sbi->devs.path[] to store null character of device path string.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
dc0172c74bd9edaee7bea2ebb35f3dbd37a8ae80
Version
3c62be17d4f562f43fe1d03b48194399caa35aa5
Status
affected
Version <
1cf1ff15f262e8baf12201b270b6a79f9d119b2d
Version
3c62be17d4f562f43fe1d03b48194399caa35aa5
Status
affected
Version <
666b7cf6ac9aa074b8319a2b68cba7f2c30023f0
Version
3c62be17d4f562f43fe1d03b48194399caa35aa5
Status
affected
Version <
3466721f06edff834f99d9f49f23eabc6b2cb78e
Version
3c62be17d4f562f43fe1d03b48194399caa35aa5
Status
affected
Version <
345fc8d1838f3f8be7c8ed08d86a13dedef67136
Version
3c62be17d4f562f43fe1d03b48194399caa35aa5
Status
affected
Version <
70849d33130a2cf1d6010069ed200669c8651fbd
Version
3c62be17d4f562f43fe1d03b48194399caa35aa5
Status
affected
Version <
755427093e4294ac111c3f9e40d53f681a0fbdaa
Version
3c62be17d4f562f43fe1d03b48194399caa35aa5
Status
affected
Version <
1b1efa5f0e878745e94a98022e8edc675a87d78e
Version
3c62be17d4f562f43fe1d03b48194399caa35aa5
Status
affected
Version <
5661998536af52848cc4d52a377e90368196edea
Version
3c62be17d4f562f43fe1d03b48194399caa35aa5
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
4.10
Status
affected
Version <
4.10
Version
0
Status
unaffected
Version <=
5.4.*
Version
5.4.297
Status
unaffected
Version <=
5.10.*
Version
5.10.241
Status
unaffected
Version <=
5.15.*
Version
5.15.190
Status
unaffected
Version <=
6.1.*
Version
6.1.148
Status
unaffected
Version <=
6.6.*
Version
6.6.102
Status
unaffected
Version <=
6.12.*
Version
6.12.42
Status
unaffected
Version <=
6.15.*
Version
6.15.10
Status
unaffected
Version <=
6.16.*
Version
6.16.1
Status
unaffected
Version <=
*
Version
6.17-rc1
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.05% | 0.17 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|