CVE-2025-68769

Source
https://cve.org/CVERecord?id=CVE-2025-68769
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-68769.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-68769
Downstream
Related
Published
2026-01-13T15:28:47.798Z
Modified
2026-03-20T12:46:28.643913Z
Summary
f2fs: fix return value of f2fs_recover_fsync_data()
Details

In the Linux kernel, the following vulnerability has been resolved:

f2fs: fix return value of f2fsrecoverfsync_data()

With below scripts, it will trigger panic in f2fs:

mkfs.f2fs -f /dev/vdd mount /dev/vdd /mnt/f2fs touch /mnt/f2fs/foo sync echo 111 >> /mnt/f2fs/foo f2fsio fsync /mnt/f2fs/foo f2fsio shutdown 2 /mnt/f2fs umount /mnt/f2fs mount -o ro,norecovery /dev/vdd /mnt/f2fs or mount -o ro,disablerollforward /dev/vdd /mnt/f2fs

F2FS-fs (vdd): f2fsrecoverfsyncdata: recovery fsync data, checkonly: 0 F2FS-fs (vdd): Mounted with checkpoint version = 7f5c361f F2FS-fs (vdd): Stopped filesystem due to reason: 0 F2FS-fs (vdd): f2fsrecoverfsyncdata: recovery fsync data, checkonly: 1 Filesystem f2fs gettree() didn't set fc->root, returned 1 ------------[ cut here ]------------ kernel BUG at fs/super.c:1761! Oops: invalid opcode: 0000 [#1] SMP PTI CPU: 3 UID: 0 PID: 722 Comm: mount Not tainted 6.18.0-rc2+ #721 PREEMPT(voluntary) Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 RIP: 0010:vfsgettree.cold+0x18/0x1a Call Trace: <TASK> fcmount+0x13/0xa0 path_mount+0x34e/0xc50 __x64sysmount+0x121/0x150 dosyscall64+0x84/0x800 entrySYSCALL64afterhwframe+0x76/0x7e RIP: 0033:0x7fa6cc126cfe

The root cause is we missed to handle error number returned from f2fsrecoverfsyncdata() when mounting image w/ ro,norecovery or ro,disablerollforward mount option, result in returning a positive error number to vfsget_tree(), fix it.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/68xxx/CVE-2025-68769.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
6781eabba1bdb133eb9125c4acf6704ccbe4df02
Fixed
e6ac31abd30e9fd2ef5f0819ce7f3f932be3b725
Fixed
0de4977a1eeafe9d77701e3c031a1bcdba389243
Fixed
9bc246018aaa3b46a7710428d0a2196c229f9d49
Fixed
a4c67d96f92eefcfa5596a08f069e77b743c5865
Fixed
473550e715654ad7612aa490d583cb7c25fe2ff3
Fixed
4560db9678a2c5952b6205fbca468c6805c2ba2a
Fixed
01fba45deaddcce0d0b01c411435d1acf6feab7b
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
1499d39b74f5957e932639a86487ccea5a0a9740

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-68769.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.7.0
Fixed
5.10.248
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.198
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.160
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.120
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.12.64
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.18.3

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-68769.json"