In the Linux kernel, the following vulnerability has been resolved:
f2fs: fix to bail out in getnewsegment()
------------[ cut here ]------------ WARNING: CPU: 3 PID: 579 at fs/f2fs/segment.c:2832 newcurseg+0x5e8/0x6dc pc : newcurseg+0x5e8/0x6dc Call trace: newcurseg+0x5e8/0x6dc f2fsallocatedatablock+0xa54/0xe28 dowritepage+0x6c/0x194 f2fsdowritenodepage+0x38/0x78 _writenodepage+0x248/0x6d4 f2fssyncnodepages+0x524/0x72c f2fswritecheckpoint+0x4bc/0x9b0 _checkpointandcompletereqs+0x80/0x244 issuecheckpointthread+0x8c/0xec kthread+0x114/0x1bc retfromfork+0x10/0x20
getnewsegment() detects inconsistent status in between freesegmap and freesecmap, let's record such error into super block, and bail out getnewsegment() instead of continue using the segment.
[
{
"signature_type": "Function",
"digest": {
"function_hash": "149685598037833140025878055045571646105",
"length": 2461.0
},
"target": {
"file": "fs/f2fs/segment.c",
"function": "get_new_segment"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f0023d7a2a86999c8e1300e911d92f995a5310a8",
"id": "CVE-2025-38333-20f45a9a",
"deprecated": false,
"signature_version": "v1"
},
{
"signature_type": "Function",
"digest": {
"function_hash": "15836078811434583553745375986752250789",
"length": 2498.0
},
"target": {
"file": "fs/f2fs/segment.c",
"function": "get_new_segment"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ca860f507a61c7c3d4dde47b830a5c0d555cf83c",
"id": "CVE-2025-38333-336dd5c4",
"deprecated": false,
"signature_version": "v1"
},
{
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"207519826880495423883779227406947772258",
"237257446139342970479917396120304115034",
"97124433647932256694398263028546089427",
"5815268613489905806268148998684501278"
]
},
"target": {
"file": "include/linux/f2fs_fs.h"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f0023d7a2a86999c8e1300e911d92f995a5310a8",
"id": "CVE-2025-38333-3b3e015d",
"deprecated": false,
"signature_version": "v1"
},
{
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"78970491087154368645184277136703618110",
"66496572729683361443909770747014317228",
"50187906442436960282002654810982160321",
"207322980471417682312811894265552781152"
]
},
"target": {
"file": "fs/f2fs/segment.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@f0023d7a2a86999c8e1300e911d92f995a5310a8",
"id": "CVE-2025-38333-9a9217fc",
"deprecated": false,
"signature_version": "v1"
},
{
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"78970491087154368645184277136703618110",
"66496572729683361443909770747014317228",
"47975771104371669722225945895607120480",
"121734096987153702549495889452249584426"
]
},
"target": {
"file": "fs/f2fs/segment.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ca860f507a61c7c3d4dde47b830a5c0d555cf83c",
"id": "CVE-2025-38333-dcc07929",
"deprecated": false,
"signature_version": "v1"
},
{
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"207519826880495423883779227406947772258",
"237257446139342970479917396120304115034",
"97124433647932256694398263028546089427",
"5815268613489905806268148998684501278"
]
},
"target": {
"file": "include/linux/f2fs_fs.h"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@ca860f507a61c7c3d4dde47b830a5c0d555cf83c",
"id": "CVE-2025-38333-dfd66e34",
"deprecated": false,
"signature_version": "v1"
}
]