{"id":"CVE-2025-38652","summary":"f2fs: fix to avoid out-of-boundary access in devs.path","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nf2fs: fix to avoid out-of-boundary access in devs.path\n\n- touch /mnt/f2fs/012345678901234567890123456789012345678901234567890123\n- truncate -s $((1024*1024*1024)) \\\n  /mnt/f2fs/012345678901234567890123456789012345678901234567890123\n- touch /mnt/f2fs/file\n- truncate -s $((1024*1024*1024)) /mnt/f2fs/file\n- mkfs.f2fs /mnt/f2fs/012345678901234567890123456789012345678901234567890123 \\\n  -c /mnt/f2fs/file\n- mount /mnt/f2fs/012345678901234567890123456789012345678901234567890123 \\\n  /mnt/f2fs/loop\n\n[16937.192225] F2FS-fs (loop0): Mount Device [ 0]: /mnt/f2fs/012345678901234567890123456789012345678901234567890123\\xff\\x01,      511,        0 -    3ffff\n[16937.192268] F2FS-fs (loop0): Failed to find devices\n\nIf device path length equals to MAX_PATH_LEN, sbi-\u003edevs.path[] may\nnot end up w/ null character due to path array is fully filled, So\naccidently, fields locate after path[] may be treated as part of\ndevice path, result in parsing wrong device path.\n\nstruct f2fs_dev_info {\n...\n\tchar path[MAX_PATH_LEN];\n...\n};\n\nLet's add one byte space for sbi-\u003edevs.path[] to store null\ncharacter of device path string.","modified":"2026-03-20T12:42:58.065316Z","published":"2025-08-22T16:00:56.445Z","related":["MGASA-2025-0234","MGASA-2025-0235","openSUSE-SU-2025:15533-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38652.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/1b1efa5f0e878745e94a98022e8edc675a87d78e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/1cf1ff15f262e8baf12201b270b6a79f9d119b2d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/345fc8d1838f3f8be7c8ed08d86a13dedef67136"},{"type":"WEB","url":"https://git.kernel.org/stable/c/3466721f06edff834f99d9f49f23eabc6b2cb78e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/5661998536af52848cc4d52a377e90368196edea"},{"type":"WEB","url":"https://git.kernel.org/stable/c/666b7cf6ac9aa074b8319a2b68cba7f2c30023f0"},{"type":"WEB","url":"https://git.kernel.org/stable/c/70849d33130a2cf1d6010069ed200669c8651fbd"},{"type":"WEB","url":"https://git.kernel.org/stable/c/755427093e4294ac111c3f9e40d53f681a0fbdaa"},{"type":"WEB","url":"https://git.kernel.org/stable/c/dc0172c74bd9edaee7bea2ebb35f3dbd37a8ae80"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38652.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-38652"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"3c62be17d4f562f43fe1d03b48194399caa35aa5"},{"fixed":"dc0172c74bd9edaee7bea2ebb35f3dbd37a8ae80"},{"fixed":"1cf1ff15f262e8baf12201b270b6a79f9d119b2d"},{"fixed":"666b7cf6ac9aa074b8319a2b68cba7f2c30023f0"},{"fixed":"3466721f06edff834f99d9f49f23eabc6b2cb78e"},{"fixed":"345fc8d1838f3f8be7c8ed08d86a13dedef67136"},{"fixed":"70849d33130a2cf1d6010069ed200669c8651fbd"},{"fixed":"755427093e4294ac111c3f9e40d53f681a0fbdaa"},{"fixed":"1b1efa5f0e878745e94a98022e8edc675a87d78e"},{"fixed":"5661998536af52848cc4d52a377e90368196edea"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38652.json"}}],"schema_version":"1.7.5"}