In the Linux kernel, the following vulnerability has been resolved:
f2fs: fix KMSAN uninit-value in extent_info usage
KMSAN reported a use of uninitialized value in __is_extent_mergeable()
and __is_back_mergeable() via the read extent tree path.
The root cause is that get_read_extent_info() only initializes three
fields (fofs, blk, len) of struct extent_info, leaving the
remaining fields uninitialized. This leads to undefined behavior
when those fields are accessed later, especially during
extent merging.
Fix it by zero-initializing the extent_info struct before population.
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38579.json"
}[
{
"signature_type": "Function",
"deprecated": false,
"id": "CVE-2025-38579-a8556b08",
"target": {
"file": "fs/f2fs/extent_cache.c",
"function": "f2fs_init_read_extent_tree"
},
"digest": {
"length": 973.0,
"function_hash": "62410681316457024214001723746931363790"
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@44a79437309e0ee2276ac17aaedc71253af253a8"
},
{
"signature_type": "Line",
"deprecated": false,
"id": "CVE-2025-38579-c47bafc9",
"target": {
"file": "fs/f2fs/extent_cache.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"57809904543385259674042874993128232154",
"192874406106797115932895038712944849518",
"15487074288741944666858909643565863539",
"19488881582710685622947487285962714631"
]
},
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@44a79437309e0ee2276ac17aaedc71253af253a8"
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-38579.json"