{"id":"CVE-2025-38163","summary":"f2fs: fix to do sanity check on sbi-\u003etotal_valid_block_count","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nf2fs: fix to do sanity check on sbi-\u003etotal_valid_block_count\n\nsyzbot reported a f2fs bug as below:\n\n------------[ cut here ]------------\nkernel BUG at fs/f2fs/f2fs.h:2521!\nRIP: 0010:dec_valid_block_count+0x3b2/0x3c0 fs/f2fs/f2fs.h:2521\nCall Trace:\n f2fs_truncate_data_blocks_range+0xc8c/0x11a0 fs/f2fs/file.c:695\n truncate_dnode+0x417/0x740 fs/f2fs/node.c:973\n truncate_nodes+0x3ec/0xf50 fs/f2fs/node.c:1014\n f2fs_truncate_inode_blocks+0x8e3/0x1370 fs/f2fs/node.c:1197\n f2fs_do_truncate_blocks+0x840/0x12b0 fs/f2fs/file.c:810\n f2fs_truncate_blocks+0x10d/0x300 fs/f2fs/file.c:838\n f2fs_truncate+0x417/0x720 fs/f2fs/file.c:888\n f2fs_setattr+0xc4f/0x12f0 fs/f2fs/file.c:1112\n notify_change+0xbca/0xe90 fs/attr.c:552\n do_truncate+0x222/0x310 fs/open.c:65\n handle_truncate fs/namei.c:3466 [inline]\n do_open fs/namei.c:3849 [inline]\n path_openat+0x2e4f/0x35d0 fs/namei.c:4004\n do_filp_open+0x284/0x4e0 fs/namei.c:4031\n do_sys_openat2+0x12b/0x1d0 fs/open.c:1429\n do_sys_open fs/open.c:1444 [inline]\n __do_sys_creat fs/open.c:1522 [inline]\n __se_sys_creat fs/open.c:1516 [inline]\n __x64_sys_creat+0x124/0x170 fs/open.c:1516\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xf3/0x230 arch/x86/entry/syscall_64.c:94\n\nThe reason is: in fuzzed image, sbi-\u003etotal_valid_block_count is\ninconsistent w/ mapped blocks indexed by inode, so, we should\nnot trigger panic for such case, instead, let's print log and\nset fsck flag.","modified":"2026-04-16T04:43:42.124222262Z","published":"2025-07-03T08:36:04.397Z","database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38163.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/05872a167c2cab80ef186ef23cc34a6776a1a30c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/25f3776b58c1c45ad2e50ab4b263505b4d2378ca"},{"type":"WEB","url":"https://git.kernel.org/stable/c/49bc7bf38e42cfa642787e947f5721696ea73ac3"},{"type":"WEB","url":"https://git.kernel.org/stable/c/65b3f76592aed5a43c4d79375ac097acf975972b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/6a324d77f7ea1a91d55c4b6ad970e3ac9ab6a20d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a39cc43efc1bca74ed9d6cf9e60b995071f7d178"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ccc28c0397f75a3ec9539cceed9db014d7b73869"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f1b743c1955151bd392539b739a3ad155296be13"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38163.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-38163"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"39a53e0ce0df01b3cf4bb898c7ae2fd2189647d5"},{"fixed":"49bc7bf38e42cfa642787e947f5721696ea73ac3"},{"fixed":"f1b743c1955151bd392539b739a3ad155296be13"},{"fixed":"6a324d77f7ea1a91d55c4b6ad970e3ac9ab6a20d"},{"fixed":"25f3776b58c1c45ad2e50ab4b263505b4d2378ca"},{"fixed":"a39cc43efc1bca74ed9d6cf9e60b995071f7d178"},{"fixed":"65b3f76592aed5a43c4d79375ac097acf975972b"},{"fixed":"ccc28c0397f75a3ec9539cceed9db014d7b73869"},{"fixed":"05872a167c2cab80ef186ef23cc34a6776a1a30c"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-38163.json"}}],"schema_version":"1.7.5"}