Improper error handling in Linux kernel - CVE-2025-38626
Published: August 28, 2025
Vulnerability identifier: #VU114536
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2025-38626
CWE-ID: CWE-388
Exploitation vector: Local access
Exploit availability:
No public exploit available
Vendor: Linux Foundation
Affected software:
Linux kernel
Linux kernel
Detailed vulnerability description
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the f2fs_map_blocks() function in fs/f2fs/data.c. A local user can perform a denial of service (DoS) attack.
How to mitigate CVE-2025-38626
Install update from vendor's repository.
Sources
- https://git.kernel.org/stable/c/1005a3ca28e90c7a64fa43023f866b960a60f791
- https://git.kernel.org/stable/c/264ede8a52f18647ed5bb5f2bd9bf54f556ad8f5
- https://git.kernel.org/stable/c/385e64a0744584397b4b52b27c96703516f39968
- https://git.kernel.org/stable/c/82765ce5c7a56f9309ee45328e763610eaf11253
- https://git.kernel.org/stable/c/f289690f50a01c3e085d87853392d5b7436a4cee