CVE-2025-38163
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
03/07/2025
Last modified:
18/12/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
f2fs: fix to do sanity check on sbi->total_valid_block_count<br />
<br />
syzbot reported a f2fs bug as below:<br />
<br />
------------[ cut here ]------------<br />
kernel BUG at fs/f2fs/f2fs.h:2521!<br />
RIP: 0010:dec_valid_block_count+0x3b2/0x3c0 fs/f2fs/f2fs.h:2521<br />
Call Trace:<br />
f2fs_truncate_data_blocks_range+0xc8c/0x11a0 fs/f2fs/file.c:695<br />
truncate_dnode+0x417/0x740 fs/f2fs/node.c:973<br />
truncate_nodes+0x3ec/0xf50 fs/f2fs/node.c:1014<br />
f2fs_truncate_inode_blocks+0x8e3/0x1370 fs/f2fs/node.c:1197<br />
f2fs_do_truncate_blocks+0x840/0x12b0 fs/f2fs/file.c:810<br />
f2fs_truncate_blocks+0x10d/0x300 fs/f2fs/file.c:838<br />
f2fs_truncate+0x417/0x720 fs/f2fs/file.c:888<br />
f2fs_setattr+0xc4f/0x12f0 fs/f2fs/file.c:1112<br />
notify_change+0xbca/0xe90 fs/attr.c:552<br />
do_truncate+0x222/0x310 fs/open.c:65<br />
handle_truncate fs/namei.c:3466 [inline]<br />
do_open fs/namei.c:3849 [inline]<br />
path_openat+0x2e4f/0x35d0 fs/namei.c:4004<br />
do_filp_open+0x284/0x4e0 fs/namei.c:4031<br />
do_sys_openat2+0x12b/0x1d0 fs/open.c:1429<br />
do_sys_open fs/open.c:1444 [inline]<br />
__do_sys_creat fs/open.c:1522 [inline]<br />
__se_sys_creat fs/open.c:1516 [inline]<br />
__x64_sys_creat+0x124/0x170 fs/open.c:1516<br />
do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]<br />
do_syscall_64+0xf3/0x230 arch/x86/entry/syscall_64.c:94<br />
<br />
The reason is: in fuzzed image, sbi->total_valid_block_count is<br />
inconsistent w/ mapped blocks indexed by inode, so, we should<br />
not trigger panic for such case, instead, let&#39;s print log and<br />
set fsck flag.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 3.8 (including) | 5.4.295 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.239 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.186 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.142 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.94 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.34 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.15.3 (excluding) |
| cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/05872a167c2cab80ef186ef23cc34a6776a1a30c
- https://git.kernel.org/stable/c/25f3776b58c1c45ad2e50ab4b263505b4d2378ca
- https://git.kernel.org/stable/c/49bc7bf38e42cfa642787e947f5721696ea73ac3
- https://git.kernel.org/stable/c/65b3f76592aed5a43c4d79375ac097acf975972b
- https://git.kernel.org/stable/c/6a324d77f7ea1a91d55c4b6ad970e3ac9ab6a20d
- https://git.kernel.org/stable/c/a39cc43efc1bca74ed9d6cf9e60b995071f7d178
- https://git.kernel.org/stable/c/ccc28c0397f75a3ec9539cceed9db014d7b73869
- https://git.kernel.org/stable/c/f1b743c1955151bd392539b739a3ad155296be13
- https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html
- https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html



