CVE-2025-38577
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
19/08/2025
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
f2fs: fix to avoid panic in f2fs_evict_inode<br />
<br />
As syzbot [1] reported as below:<br />
<br />
R10: 0000000000000100 R11: 0000000000000206 R12: 00007ffe17473450<br />
R13: 00007f28b1c10854 R14: 000000000000dae5 R15: 00007ffe17474520<br />
<br />
---[ end trace 0000000000000000 ]---<br />
==================================================================<br />
BUG: KASAN: use-after-free in __list_del_entry_valid+0xa6/0x130 lib/list_debug.c:62<br />
Read of size 8 at addr ffff88812d962278 by task syz-executor/564<br />
<br />
CPU: 1 PID: 564 Comm: syz-executor Tainted: G W 6.1.129-syzkaller #0<br />
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025<br />
Call Trace:<br />
<br />
__dump_stack+0x21/0x24 lib/dump_stack.c:88<br />
dump_stack_lvl+0xee/0x158 lib/dump_stack.c:106<br />
print_address_description+0x71/0x210 mm/kasan/report.c:316<br />
print_report+0x4a/0x60 mm/kasan/report.c:427<br />
kasan_report+0x122/0x150 mm/kasan/report.c:531<br />
__asan_report_load8_noabort+0x14/0x20 mm/kasan/report_generic.c:351<br />
__list_del_entry_valid+0xa6/0x130 lib/list_debug.c:62<br />
__list_del_entry include/linux/list.h:134 [inline]<br />
list_del_init include/linux/list.h:206 [inline]<br />
f2fs_inode_synced+0xf7/0x2e0 fs/f2fs/super.c:1531<br />
f2fs_update_inode+0x74/0x1c40 fs/f2fs/inode.c:585<br />
f2fs_update_inode_page+0x137/0x170 fs/f2fs/inode.c:703<br />
f2fs_write_inode+0x4ec/0x770 fs/f2fs/inode.c:731<br />
write_inode fs/fs-writeback.c:1460 [inline]<br />
__writeback_single_inode+0x4a0/0xab0 fs/fs-writeback.c:1677<br />
writeback_single_inode+0x221/0x8b0 fs/fs-writeback.c:1733<br />
sync_inode_metadata+0xb6/0x110 fs/fs-writeback.c:2789<br />
f2fs_sync_inode_meta+0x16d/0x2a0 fs/f2fs/checkpoint.c:1159<br />
block_operations fs/f2fs/checkpoint.c:1269 [inline]<br />
f2fs_write_checkpoint+0xca3/0x2100 fs/f2fs/checkpoint.c:1658<br />
kill_f2fs_super+0x231/0x390 fs/f2fs/super.c:4668<br />
deactivate_locked_super+0x98/0x100 fs/super.c:332<br />
deactivate_super+0xaf/0xe0 fs/super.c:363<br />
cleanup_mnt+0x45f/0x4e0 fs/namespace.c:1186<br />
__cleanup_mnt+0x19/0x20 fs/namespace.c:1193<br />
task_work_run+0x1c6/0x230 kernel/task_work.c:203<br />
exit_task_work include/linux/task_work.h:39 [inline]<br />
do_exit+0x9fb/0x2410 kernel/exit.c:871<br />
do_group_exit+0x210/0x2d0 kernel/exit.c:1021<br />
__do_sys_exit_group kernel/exit.c:1032 [inline]<br />
__se_sys_exit_group kernel/exit.c:1030 [inline]<br />
__x64_sys_exit_group+0x3f/0x40 kernel/exit.c:1030<br />
x64_sys_call+0x7b4/0x9a0 arch/x86/include/generated/asm/syscalls_64.h:232<br />
do_syscall_x64 arch/x86/entry/common.c:51 [inline]<br />
do_syscall_64+0x4c/0xa0 arch/x86/entry/common.c:81<br />
entry_SYSCALL_64_after_hwframe+0x68/0xd2<br />
RIP: 0033:0x7f28b1b8e169<br />
Code: Unable to access opcode bytes at 0x7f28b1b8e13f.<br />
RSP: 002b:00007ffe174710a8 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7<br />
RAX: ffffffffffffffda RBX: 00007f28b1c10879 RCX: 00007f28b1b8e169<br />
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000001<br />
RBP: 0000000000000002 R08: 00007ffe1746ee47 R09: 00007ffe17472360<br />
R10: 0000000000000009 R11: 0000000000000246 R12: 00007ffe17472360<br />
R13: 00007f28b1c10854 R14: 000000000000dae5 R15: 00007ffe17474520<br />
<br />
<br />
Allocated by task 569:<br />
kasan_save_stack mm/kasan/common.c:45 [inline]<br />
kasan_set_track+0x4b/0x70 mm/kasan/common.c:52<br />
kasan_save_alloc_info+0x25/0x30 mm/kasan/generic.c:505<br />
__kasan_slab_alloc+0x72/0x80 mm/kasan/common.c:328<br />
kasan_slab_alloc include/linux/kasan.h:201 [inline]<br />
slab_post_alloc_hook+0x4f/0x2c0 mm/slab.h:737<br />
slab_alloc_node mm/slub.c:3398 [inline]<br />
slab_alloc mm/slub.c:3406 [inline]<br />
__kmem_cache_alloc_lru mm/slub.c:3413 [inline]<br />
kmem_cache_alloc_lru+0x104/0x220 mm/slub.c:3429<br />
alloc_inode_sb include/linux/fs.h:3245 [inline]<br />
f2fs_alloc_inode+0x2d/0x340 fs/f2fs/super.c:1419<br />
alloc_inode fs/inode.c:261 [inline]<br />
iget_locked+0x186/0x880 fs/inode.c:1373<br />
f2fs_iget+0x55/0x4c60 fs/f2fs/inode.c:483<br />
f2fs_lookup+0x366/0xab0 fs/f2fs/namei.c:487<br />
__lookup_slow+0x2a3/0x3d0 fs/namei.c:1690<br />
lookup_slow+0x57/0x70 fs/namei.c:1707<br />
walk_component+0x2e6/0x410 fs/namei<br />
---truncated---
Impact
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/15df59809c54fbd687cdf27efbd2103a937459be
- https://git.kernel.org/stable/c/42f9ea16aea8b49febaa87950a006a1792209f38
- https://git.kernel.org/stable/c/4732ca17c17f5062426cfa982f43593e6b81963b
- https://git.kernel.org/stable/c/5cd99d5aa3d39086bdb53eb5c52df16e98b101a0
- https://git.kernel.org/stable/c/880ef748e78a1eb7df2d8e11a9ef21e98bcaabe5
- https://git.kernel.org/stable/c/9535e440fe5bc6c5ac7cfb407e53bf788b8bf8d4
- https://git.kernel.org/stable/c/97df495d754116c8c28ac6a4112f831727bde887
- https://git.kernel.org/stable/c/9bbfe83924946552c4c513099c0e8c83af76311a
- https://git.kernel.org/stable/c/a509a55f8eecc8970b3980c6f06886bbff0e2f68
- https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html
- https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html



