CVE-2025-38677
BaseFortify
Publication date: 2025-08-30
Last updated on: 2025-11-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | kernel | 5.10.244-1 |
| linux | kernel | 6.1.153-1 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a flaw in the Linux kernel's f2fs filesystem where an out-of-boundary memory access can occur due to improper handling of dnode page data. Specifically, a corrupted image can cause a dnode to have the same node ID as its inode, leading the function f2fs_get_dnode_of_data() to incorrectly parse the dnode as an inode node. This results in accessing memory beyond the intended boundary, which can cause system instability or crashes. The fix involves adding a sanity check for node IDs of all direct nodes during this function to prevent such out-of-bound access.
How can this vulnerability impact me? :
This vulnerability can lead to out-of-boundary memory access in the Linux kernel, which may cause system crashes, data corruption, or potential denial of service. If exploited, it could destabilize the system or affect the integrity of data stored on the f2fs filesystem.