-

CVE-2025-38652

In the Linux kernel, the following vulnerability has been resolved:

f2fs: fix to avoid out-of-boundary access in devs.path

- touch /mnt/f2fs/012345678901234567890123456789012345678901234567890123
- truncate -s $((1024*1024*1024)) \
  /mnt/f2fs/012345678901234567890123456789012345678901234567890123
- touch /mnt/f2fs/file
- truncate -s $((1024*1024*1024)) /mnt/f2fs/file
- mkfs.f2fs /mnt/f2fs/012345678901234567890123456789012345678901234567890123 \
  -c /mnt/f2fs/file
- mount /mnt/f2fs/012345678901234567890123456789012345678901234567890123 \
  /mnt/f2fs/loop

[16937.192225] F2FS-fs (loop0): Mount Device [ 0]: /mnt/f2fs/012345678901234567890123456789012345678901234567890123\xff\x01,      511,        0 -    3ffff
[16937.192268] F2FS-fs (loop0): Failed to find devices

If device path length equals to MAX_PATH_LEN, sbi->devs.path[] may
not end up w/ null character due to path array is fully filled, So
accidently, fields locate after path[] may be treated as part of
device path, result in parsing wrong device path.

struct f2fs_dev_info {
...
	char path[MAX_PATH_LEN];
...
};

Let's add one byte space for sbi->devs.path[] to store null
character of device path string.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < dc0172c74bd9edaee7bea2ebb35f3dbd37a8ae80
Version 3c62be17d4f562f43fe1d03b48194399caa35aa5
Status affected
Version < 1cf1ff15f262e8baf12201b270b6a79f9d119b2d
Version 3c62be17d4f562f43fe1d03b48194399caa35aa5
Status affected
Version < 666b7cf6ac9aa074b8319a2b68cba7f2c30023f0
Version 3c62be17d4f562f43fe1d03b48194399caa35aa5
Status affected
Version < 3466721f06edff834f99d9f49f23eabc6b2cb78e
Version 3c62be17d4f562f43fe1d03b48194399caa35aa5
Status affected
Version < 345fc8d1838f3f8be7c8ed08d86a13dedef67136
Version 3c62be17d4f562f43fe1d03b48194399caa35aa5
Status affected
Version < 70849d33130a2cf1d6010069ed200669c8651fbd
Version 3c62be17d4f562f43fe1d03b48194399caa35aa5
Status affected
Version < 755427093e4294ac111c3f9e40d53f681a0fbdaa
Version 3c62be17d4f562f43fe1d03b48194399caa35aa5
Status affected
Version < 1b1efa5f0e878745e94a98022e8edc675a87d78e
Version 3c62be17d4f562f43fe1d03b48194399caa35aa5
Status affected
Version < 5661998536af52848cc4d52a377e90368196edea
Version 3c62be17d4f562f43fe1d03b48194399caa35aa5
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 4.10
Status affected
Version < 4.10
Version 0
Status unaffected
Version <= 5.4.*
Version 5.4.297
Status unaffected
Version <= 5.10.*
Version 5.10.241
Status unaffected
Version <= 5.15.*
Version 5.15.190
Status unaffected
Version <= 6.1.*
Version 6.1.148
Status unaffected
Version <= 6.6.*
Version 6.6.102
Status unaffected
Version <= 6.12.*
Version 6.12.42
Status unaffected
Version <= 6.15.*
Version 6.15.10
Status unaffected
Version <= 6.16.*
Version 6.16.1
Status unaffected
Version <= *
Version 6.17-rc1
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.05% 0.17
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string