CVE-2025-38577

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-38577
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38577.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-38577
Downstream
Related
Published
2025-08-19T17:03:00.534Z
Modified
2025-11-28T02:34:37.590379Z
Summary
f2fs: fix to avoid panic in f2fs_evict_inode
Details

In the Linux kernel, the following vulnerability has been resolved:

f2fs: fix to avoid panic in f2fsevictinode

As syzbot [1] reported as below:

R10: 0000000000000100 R11: 0000000000000206 R12: 00007ffe17473450 R13: 00007f28b1c10854 R14: 000000000000dae5 R15: 00007ffe17474520 </TASK>

---[ end trace 0000000000000000 ]---

BUG: KASAN: use-after-free in _listdelentryvalid+0xa6/0x130 lib/list_debug.c:62 Read of size 8 at addr ffff88812d962278 by task syz-executor/564

CPU: 1 PID: 564 Comm: syz-executor Tainted: G W 6.1.129-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 Call Trace: <TASK> _dumpstack+0x21/0x24 lib/dumpstack.c:88 dumpstacklvl+0xee/0x158 lib/dumpstack.c:106 printaddressdescription+0x71/0x210 mm/kasan/report.c:316 printreport+0x4a/0x60 mm/kasan/report.c:427 kasanreport+0x122/0x150 mm/kasan/report.c:531 _asanreportload8noabort+0x14/0x20 mm/kasan/reportgeneric.c:351 _listdelentryvalid+0xa6/0x130 lib/listdebug.c:62 _listdelentry include/linux/list.h:134 [inline] listdelinit include/linux/list.h:206 [inline] f2fsinodesynced+0xf7/0x2e0 fs/f2fs/super.c:1531 f2fsupdateinode+0x74/0x1c40 fs/f2fs/inode.c:585 f2fsupdateinodepage+0x137/0x170 fs/f2fs/inode.c:703 f2fswriteinode+0x4ec/0x770 fs/f2fs/inode.c:731 writeinode fs/fs-writeback.c:1460 [inline] _writebacksingleinode+0x4a0/0xab0 fs/fs-writeback.c:1677 writebacksingleinode+0x221/0x8b0 fs/fs-writeback.c:1733 syncinodemetadata+0xb6/0x110 fs/fs-writeback.c:2789 f2fssyncinodemeta+0x16d/0x2a0 fs/f2fs/checkpoint.c:1159 blockoperations fs/f2fs/checkpoint.c:1269 [inline] f2fswritecheckpoint+0xca3/0x2100 fs/f2fs/checkpoint.c:1658 killf2fssuper+0x231/0x390 fs/f2fs/super.c:4668 deactivatelockedsuper+0x98/0x100 fs/super.c:332 deactivatesuper+0xaf/0xe0 fs/super.c:363 cleanupmnt+0x45f/0x4e0 fs/namespace.c:1186 _cleanupmnt+0x19/0x20 fs/namespace.c:1193 taskworkrun+0x1c6/0x230 kernel/taskwork.c:203 exittaskwork include/linux/taskwork.h:39 [inline] doexit+0x9fb/0x2410 kernel/exit.c:871 dogroupexit+0x210/0x2d0 kernel/exit.c:1021 _dosysexitgroup kernel/exit.c:1032 [inline] _sesysexitgroup kernel/exit.c:1030 [inline] _x64sysexitgroup+0x3f/0x40 kernel/exit.c:1030 x64syscall+0x7b4/0x9a0 arch/x86/include/generated/asm/syscalls64.h:232 dosyscallx64 arch/x86/entry/common.c:51 [inline] dosyscall64+0x4c/0xa0 arch/x86/entry/common.c:81 entrySYSCALL64afterhwframe+0x68/0xd2 RIP: 0033:0x7f28b1b8e169 Code: Unable to access opcode bytes at 0x7f28b1b8e13f. RSP: 002b:00007ffe174710a8 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 RAX: ffffffffffffffda RBX: 00007f28b1c10879 RCX: 00007f28b1b8e169 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000001 RBP: 0000000000000002 R08: 00007ffe1746ee47 R09: 00007ffe17472360 R10: 0000000000000009 R11: 0000000000000246 R12: 00007ffe17472360 R13: 00007f28b1c10854 R14: 000000000000dae5 R15: 00007ffe17474520 </TASK>

Allocated by task 569: kasansavestack mm/kasan/common.c:45 [inline] kasansettrack+0x4b/0x70 mm/kasan/common.c:52 kasansaveallocinfo+0x25/0x30 mm/kasan/generic.c:505 _kasanslaballoc+0x72/0x80 mm/kasan/common.c:328 kasanslaballoc include/linux/kasan.h:201 [inline] slabpostallochook+0x4f/0x2c0 mm/slab.h:737 slaballocnode mm/slub.c:3398 [inline] slaballoc mm/slub.c:3406 [inline] _kmemcachealloclru mm/slub.c:3413 [inline] kmemcachealloclru+0x104/0x220 mm/slub.c:3429 allocinodesb include/linux/fs.h:3245 [inline] f2fsallocinode+0x2d/0x340 fs/f2fs/super.c:1419 allocinode fs/inode.c:261 [inline] igetlocked+0x186/0x880 fs/inode.c:1373 f2fsiget+0x55/0x4c60 fs/f2fs/inode.c:483 f2fslookup+0x366/0xab0 fs/f2fs/namei.c:487 _lookupslow+0x2a3/0x3d0 fs/namei.c:1690 lookupslow+0x57/0x70 fs/namei.c:1707 walk_component+0x2e6/0x410 fs/namei ---truncated---

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38577.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0f18b462b2e5aff64b8638e8a47284b907351ef3
Fixed
15df59809c54fbd687cdf27efbd2103a937459be
Fixed
9535e440fe5bc6c5ac7cfb407e53bf788b8bf8d4
Fixed
5cd99d5aa3d39086bdb53eb5c52df16e98b101a0
Fixed
4732ca17c17f5062426cfa982f43593e6b81963b
Fixed
880ef748e78a1eb7df2d8e11a9ef21e98bcaabe5
Fixed
97df495d754116c8c28ac6a4112f831727bde887
Fixed
9bbfe83924946552c4c513099c0e8c83af76311a
Fixed
42f9ea16aea8b49febaa87950a006a1792209f38
Fixed
a509a55f8eecc8970b3980c6f06886bbff0e2f68

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.8.0
Fixed
5.4.297
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.241
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.190
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.148
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.102
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.12.42
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.15.10
Type
ECOSYSTEM
Events
Introduced
6.16.0
Fixed
6.16.1