
Cloud Vulnerability DB
A community-led vulnerabilities database
A use-after-free vulnerability has been identified in the Linux kernel's f2fs filesystem implementation, specifically in the f2fssyncinode_meta() function. The vulnerability was discovered through syzbot testing and reported in 2025 (Debian Tracker).
The vulnerability manifests as a use-after-free condition in the _listdelentryvalid function within lib/list_debug.c at line 62. The issue occurs during inode synchronization operations in the f2fs filesystem. The bug was detected by the Kernel Address Sanitizer (KASAN) which reported a read of size 8 at an invalid memory address (Debian Tracker).
The vulnerability affects multiple Linux kernel versions across various distributions, including Debian Bullseye (5.10.223-1, 5.10.237-1), Bookworm (6.1.137-1, 6.1.147-1), and Trixie (6.12.41-1, 6.12.38-1) releases. The issue could potentially lead to system instability or privilege escalation (Debian Tracker).
A fix has been implemented in the Linux kernel version 6.17-rc1 through commit 7c30d79930132466f5be7d0b57add14d1a016bda. Various distributions have released patched versions to address this vulnerability (Debian Tracker).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."