CVE-2025-68315
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-12-16

Last updated on: 2025-12-18

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: f2fs: fix to detect potential corrupted nid in free_nid_list As reported, on-disk footer.ino and footer.nid is the same and out-of-range, let's add sanity check on f2fs_alloc_nid() to detect any potential corruption in free_nid_list.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-16
Last Modified
2025-12-18
Generated
2026-05-06
AI Q&A
2025-12-16
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
linux linux_kernel *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in the Linux kernel's f2fs filesystem involves a potential corruption issue in the free_nid_list. Specifically, the on-disk footer.ino and footer.nid values are the same and out-of-range, which can lead to corrupted node IDs (nid). A fix was implemented by adding a sanity check in the f2fs_alloc_nid() function to detect such potential corruption.


How can this vulnerability impact me? :

The vulnerability could lead to filesystem corruption due to corrupted node IDs in the free_nid_list, which may affect data integrity and stability of the filesystem using f2fs on Linux. This could result in data loss or system crashes if exploited or triggered.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart