CVE-2025-38333
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
10/07/2025
Last modified:
10/07/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
f2fs: fix to bail out in get_new_segment()<br />
<br />
------------[ cut here ]------------<br />
WARNING: CPU: 3 PID: 579 at fs/f2fs/segment.c:2832 new_curseg+0x5e8/0x6dc<br />
pc : new_curseg+0x5e8/0x6dc<br />
Call trace:<br />
new_curseg+0x5e8/0x6dc<br />
f2fs_allocate_data_block+0xa54/0xe28<br />
do_write_page+0x6c/0x194<br />
f2fs_do_write_node_page+0x38/0x78<br />
__write_node_page+0x248/0x6d4<br />
f2fs_sync_node_pages+0x524/0x72c<br />
f2fs_write_checkpoint+0x4bc/0x9b0<br />
__checkpoint_and_complete_reqs+0x80/0x244<br />
issue_checkpoint_thread+0x8c/0xec<br />
kthread+0x114/0x1bc<br />
ret_from_fork+0x10/0x20<br />
<br />
get_new_segment() detects inconsistent status in between free_segmap<br />
and free_secmap, let&#39;s record such error into super block, and bail<br />
out get_new_segment() instead of continue using the segment.