Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-40138— f2fs: fix to avoid NULL pointer dereference in f2fs_check_quota_consistency()

EPSS 0.03% · P8
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-40138

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
f2fs: fix to avoid NULL pointer dereference in f2fs_check_quota_consistency()
Source: NVD (National Vulnerability Database)
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: f2fs: fix to avoid NULL pointer dereference in f2fs_check_quota_consistency() syzbot reported a f2fs bug as below: Oops: gen[ 107.736417][ T5848] Oops: general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] SMP KASAN PTI KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007] CPU: 1 UID: 0 PID: 5848 Comm: syz-executor263 Tainted: G W 6.17.0-rc1-syzkaller-00014-g0e39a731820a #0 PREEMPT_{RT,(full)} RIP: 0010:strcmp+0x3c/0xc0 lib/string.c:284 Call Trace: <TASK> f2fs_check_quota_consistency fs/f2fs/super.c:1188 [inline] f2fs_check_opt_consistency+0x1378/0x2c10 fs/f2fs/super.c:1436 __f2fs_remount fs/f2fs/super.c:2653 [inline] f2fs_reconfigure+0x482/0x1770 fs/f2fs/super.c:5297 reconfigure_super+0x224/0x890 fs/super.c:1077 do_remount fs/namespace.c:3314 [inline] path_mount+0xd18/0xfe0 fs/namespace.c:4112 do_mount fs/namespace.c:4133 [inline] __do_sys_mount fs/namespace.c:4344 [inline] __se_sys_mount+0x317/0x410 fs/namespace.c:4321 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f The direct reason is f2fs_check_quota_consistency() may suffer null-ptr-deref issue in strcmp(). The bug can be reproduced w/ below scripts: mkfs.f2fs -f /dev/vdb mount -t f2fs -o usrquota /dev/vdb /mnt/f2fs quotacheck -uc /mnt/f2fs/ umount /mnt/f2fs mount -t f2fs -o usrjquota=aquota.user,jqfmt=vfsold /dev/vdb /mnt/f2fs mount -t f2fs -o remount,usrjquota=,jqfmt=vfsold /dev/vdb /mnt/f2fs umount /mnt/f2fs So, before old_qname and new_qname comparison, we need to check whether they are all valid pointers, fix it.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于未检查配额一致性,可能导致空指针取消引用。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
LinuxLinux d185351325237da688de006a2c579e82ea97bdfe ~ 3f3458852bbfe79c60f2412b8b04677b96688b6e -
LinuxLinux 6.17 -

II. Public POCs for CVE-2025-40138

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-40138

登录查看更多情报信息。

Same Patch Batch · Linux · 2025-11-12 · 96 CVEs total

CVE-2025-40176tls: wait for pending async decryptions if tls_strp_msg_hold fails
CVE-2025-40172accel/qaic: Treat remaining == 0 as error in find_and_map_user_pages()
CVE-2025-40169bpf: Reject negative offsets for ALU ops
CVE-2025-40166drm/xe/guc: Check GuC running state before deregistering exec queue
CVE-2025-40167ext4: detect invalid INLINE_DATA + EXTENTS flag combination
CVE-2025-40164usbnet: Fix using smp_processor_id() in preemptible code warnings
CVE-2025-40162ASoC: amd/sdw_utils: avoid NULL deref when devm_kasprintf() fails
CVE-2025-40163sched/deadline: Stop dl_server before CPU goes offline
CVE-2025-40165media: nxp: imx8-isi: m2m: Fix streaming cleanup on release
CVE-2025-40175idpf: cleanup remaining SKBs in PTP flows
CVE-2025-40174x86/mm: Fix SMP ordering in switch_mm_irqs_off()
CVE-2025-40173net/ip6_tunnel: Prevent perpetual tunnel growth
CVE-2025-40177accel/qaic: Fix bootlog initialization ordering
CVE-2025-40178pid: Add a judgment for ns null in pid_nr_ns
CVE-2025-40179ext4: verify orphan file size is not too big
CVE-2025-40180mailbox: zynqmp-ipi: Fix out-of-bounds access in mailbox cleanup loop
CVE-2025-40181x86/kvm: Force legacy PCI hole to UC when overriding MTRRs for TDX/SNP
CVE-2025-40183bpf: Fix metadata_dst leak __bpf_redirect_neigh_v{4,6}
CVE-2025-40182crypto: skcipher - Fix reqsize handling
CVE-2025-40184KVM: arm64: Fix debug checking for np-guests using huge mappings

Showing top 20 of 96 CVEs. View all on vendor page &rarr; →

IV. Related Vulnerabilities

V. Comments for CVE-2025-40138

No comments yet


Leave a comment