-

CVE-2025-38652

In the Linux kernel, the following vulnerability has been resolved:

f2fs: fix to avoid out-of-boundary access in devs.path

- touch /mnt/f2fs/012345678901234567890123456789012345678901234567890123
- truncate -s $((1024*1024*1024)) \
  /mnt/f2fs/012345678901234567890123456789012345678901234567890123
- touch /mnt/f2fs/file
- truncate -s $((1024*1024*1024)) /mnt/f2fs/file
- mkfs.f2fs /mnt/f2fs/012345678901234567890123456789012345678901234567890123 \
  -c /mnt/f2fs/file
- mount /mnt/f2fs/012345678901234567890123456789012345678901234567890123 \
  /mnt/f2fs/loop

[16937.192225] F2FS-fs (loop0): Mount Device [ 0]: /mnt/f2fs/012345678901234567890123456789012345678901234567890123\xff\x01,      511,        0 -    3ffff
[16937.192268] F2FS-fs (loop0): Failed to find devices

If device path length equals to MAX_PATH_LEN, sbi->devs.path[] may
not end up w/ null character due to path array is fully filled, So
accidently, fields locate after path[] may be treated as part of
device path, result in parsing wrong device path.

struct f2fs_dev_info {
...
	char path[MAX_PATH_LEN];
...
};

Let's add one byte space for sbi->devs.path[] to store null
character of device path string.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < dc0172c74bd9edaee7bea2ebb35f3dbd37a8ae80
Version 3c62be17d4f562f43fe1d03b48194399caa35aa5
Status affected
Version < 1cf1ff15f262e8baf12201b270b6a79f9d119b2d
Version 3c62be17d4f562f43fe1d03b48194399caa35aa5
Status affected
Version < 666b7cf6ac9aa074b8319a2b68cba7f2c30023f0
Version 3c62be17d4f562f43fe1d03b48194399caa35aa5
Status affected
Version < 3466721f06edff834f99d9f49f23eabc6b2cb78e
Version 3c62be17d4f562f43fe1d03b48194399caa35aa5
Status affected
Version < 345fc8d1838f3f8be7c8ed08d86a13dedef67136
Version 3c62be17d4f562f43fe1d03b48194399caa35aa5
Status affected
Version < 70849d33130a2cf1d6010069ed200669c8651fbd
Version 3c62be17d4f562f43fe1d03b48194399caa35aa5
Status affected
Version < 755427093e4294ac111c3f9e40d53f681a0fbdaa
Version 3c62be17d4f562f43fe1d03b48194399caa35aa5
Status affected
Version < 1b1efa5f0e878745e94a98022e8edc675a87d78e
Version 3c62be17d4f562f43fe1d03b48194399caa35aa5
Status affected
Version < 5661998536af52848cc4d52a377e90368196edea
Version 3c62be17d4f562f43fe1d03b48194399caa35aa5
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 4.10
Status affected
Version < 4.10
Version 0
Status unaffected
Version <= 5.4.*
Version 5.4.297
Status unaffected
Version <= 5.10.*
Version 5.10.241
Status unaffected
Version <= 5.15.*
Version 5.15.190
Status unaffected
Version <= 6.1.*
Version 6.1.148
Status unaffected
Version <= 6.6.*
Version 6.6.102
Status unaffected
Version <= 6.12.*
Version 6.12.42
Status unaffected
Version <= 6.15.*
Version 6.15.10
Status unaffected
Version <= 6.16.*
Version 6.16.1
Status unaffected
Version <= *
Version 6.17-rc1
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.05% 0.17
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String