CVE-2025-38577

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
19/08/2025
Last modified:
03/11/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> f2fs: fix to avoid panic in f2fs_evict_inode<br /> <br /> As syzbot [1] reported as below:<br /> <br /> R10: 0000000000000100 R11: 0000000000000206 R12: 00007ffe17473450<br /> R13: 00007f28b1c10854 R14: 000000000000dae5 R15: 00007ffe17474520<br /> <br /> ---[ end trace 0000000000000000 ]---<br /> ==================================================================<br /> BUG: KASAN: use-after-free in __list_del_entry_valid+0xa6/0x130 lib/list_debug.c:62<br /> Read of size 8 at addr ffff88812d962278 by task syz-executor/564<br /> <br /> CPU: 1 PID: 564 Comm: syz-executor Tainted: G W 6.1.129-syzkaller #0<br /> Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025<br /> Call Trace:<br /> <br /> __dump_stack+0x21/0x24 lib/dump_stack.c:88<br /> dump_stack_lvl+0xee/0x158 lib/dump_stack.c:106<br /> print_address_description+0x71/0x210 mm/kasan/report.c:316<br /> print_report+0x4a/0x60 mm/kasan/report.c:427<br /> kasan_report+0x122/0x150 mm/kasan/report.c:531<br /> __asan_report_load8_noabort+0x14/0x20 mm/kasan/report_generic.c:351<br /> __list_del_entry_valid+0xa6/0x130 lib/list_debug.c:62<br /> __list_del_entry include/linux/list.h:134 [inline]<br /> list_del_init include/linux/list.h:206 [inline]<br /> f2fs_inode_synced+0xf7/0x2e0 fs/f2fs/super.c:1531<br /> f2fs_update_inode+0x74/0x1c40 fs/f2fs/inode.c:585<br /> f2fs_update_inode_page+0x137/0x170 fs/f2fs/inode.c:703<br /> f2fs_write_inode+0x4ec/0x770 fs/f2fs/inode.c:731<br /> write_inode fs/fs-writeback.c:1460 [inline]<br /> __writeback_single_inode+0x4a0/0xab0 fs/fs-writeback.c:1677<br /> writeback_single_inode+0x221/0x8b0 fs/fs-writeback.c:1733<br /> sync_inode_metadata+0xb6/0x110 fs/fs-writeback.c:2789<br /> f2fs_sync_inode_meta+0x16d/0x2a0 fs/f2fs/checkpoint.c:1159<br /> block_operations fs/f2fs/checkpoint.c:1269 [inline]<br /> f2fs_write_checkpoint+0xca3/0x2100 fs/f2fs/checkpoint.c:1658<br /> kill_f2fs_super+0x231/0x390 fs/f2fs/super.c:4668<br /> deactivate_locked_super+0x98/0x100 fs/super.c:332<br /> deactivate_super+0xaf/0xe0 fs/super.c:363<br /> cleanup_mnt+0x45f/0x4e0 fs/namespace.c:1186<br /> __cleanup_mnt+0x19/0x20 fs/namespace.c:1193<br /> task_work_run+0x1c6/0x230 kernel/task_work.c:203<br /> exit_task_work include/linux/task_work.h:39 [inline]<br /> do_exit+0x9fb/0x2410 kernel/exit.c:871<br /> do_group_exit+0x210/0x2d0 kernel/exit.c:1021<br /> __do_sys_exit_group kernel/exit.c:1032 [inline]<br /> __se_sys_exit_group kernel/exit.c:1030 [inline]<br /> __x64_sys_exit_group+0x3f/0x40 kernel/exit.c:1030<br /> x64_sys_call+0x7b4/0x9a0 arch/x86/include/generated/asm/syscalls_64.h:232<br /> do_syscall_x64 arch/x86/entry/common.c:51 [inline]<br /> do_syscall_64+0x4c/0xa0 arch/x86/entry/common.c:81<br /> entry_SYSCALL_64_after_hwframe+0x68/0xd2<br /> RIP: 0033:0x7f28b1b8e169<br /> Code: Unable to access opcode bytes at 0x7f28b1b8e13f.<br /> RSP: 002b:00007ffe174710a8 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7<br /> RAX: ffffffffffffffda RBX: 00007f28b1c10879 RCX: 00007f28b1b8e169<br /> RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000001<br /> RBP: 0000000000000002 R08: 00007ffe1746ee47 R09: 00007ffe17472360<br /> R10: 0000000000000009 R11: 0000000000000246 R12: 00007ffe17472360<br /> R13: 00007f28b1c10854 R14: 000000000000dae5 R15: 00007ffe17474520<br /> <br /> <br /> Allocated by task 569:<br /> kasan_save_stack mm/kasan/common.c:45 [inline]<br /> kasan_set_track+0x4b/0x70 mm/kasan/common.c:52<br /> kasan_save_alloc_info+0x25/0x30 mm/kasan/generic.c:505<br /> __kasan_slab_alloc+0x72/0x80 mm/kasan/common.c:328<br /> kasan_slab_alloc include/linux/kasan.h:201 [inline]<br /> slab_post_alloc_hook+0x4f/0x2c0 mm/slab.h:737<br /> slab_alloc_node mm/slub.c:3398 [inline]<br /> slab_alloc mm/slub.c:3406 [inline]<br /> __kmem_cache_alloc_lru mm/slub.c:3413 [inline]<br /> kmem_cache_alloc_lru+0x104/0x220 mm/slub.c:3429<br /> alloc_inode_sb include/linux/fs.h:3245 [inline]<br /> f2fs_alloc_inode+0x2d/0x340 fs/f2fs/super.c:1419<br /> alloc_inode fs/inode.c:261 [inline]<br /> iget_locked+0x186/0x880 fs/inode.c:1373<br /> f2fs_iget+0x55/0x4c60 fs/f2fs/inode.c:483<br /> f2fs_lookup+0x366/0xab0 fs/f2fs/namei.c:487<br /> __lookup_slow+0x2a3/0x3d0 fs/namei.c:1690<br /> lookup_slow+0x57/0x70 fs/namei.c:1707<br /> walk_component+0x2e6/0x410 fs/namei<br /> ---truncated---

Impact