CVE-2025-68796
Description
In the Linux kernel, the following vulnerability has been resolved:
f2fs: fix to avoid updating zero-sized extent in extent cache
As syzbot reported:
F2FS-fs (loop0): __update_extent_tree_range: extent len is zero, type: 0, extent [0, 0, 0], age [0, 0] ------------[ cut here ]------------ kernel BUG at fs/f2fs/extent_cache.c:678! Oops: invalid opcode: 0000 [#1] SMP KASAN NOPTI CPU: 0 UID: 0 PID: 5336 Comm: syz.0.0 Not tainted syzkaller #0 PREEMPT(full) Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014 RIP: 0010:__update_extent_tree_range+0x13bc/0x1500 fs/f2fs/extent_cache.c:678 Call Trace:
f2fs_update_read_extent_cache_range+0x192/0x3e0 fs/f2fs/extent_cache.c:1085 f2fs_do_zero_range fs/f2fs/file.c:1657 [inline] f2fs_zero_range+0x10c1/0x1580 fs/f2fs/file.c:1737 f2fs_fallocate+0x583/0x990 fs/f2fs/file.c:2030 vfs_fallocate+0x669/0x7e0 fs/open.c:342 ioctl_preallocate fs/ioctl.c:289 [inline] file_ioctl+0x611/0x780 fs/ioctl.c:-1 do_vfs_ioctl+0xb33/0x1430 fs/ioctl.c:576 __do_sys_ioctl fs/ioctl.c:595 [inline] __se_sys_ioctl+0x82/0x170 fs/ioctl.c:583 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f07bc58eec9
In error path of f2fs_zero_range(), it may add a zero-sized extent into extent cache, it should be avoided.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A bug in the Linux kernel's f2fs filesystem could cause a kernel crash when a zero-sized extent is incorrectly inserted into the extent cache during error handling of fallocate.
Vulnerability
Overview
CVE-68796 is a denial-of-service vulnerability in the Linux kernel's f2fs filesystem. The root cause is a missing validation check in the extent cache update path. When f2fs_zero_range() is called (e.g., via fallocate()), and an error occurs during the operation, the function may attempt to insert a zero-sized extent into the extent cache. The extent cache's __update_extent_tree_range() function contains a BUG_ON assertion that triggers when it detects an extent with zero length, leading to a kernel panic. The syzkaller reproducer demonstrates this by calling fallocate() on an f2fs loop device, hitting the BUG_ON at extent_cache.c:678 [1].
Exploitation
Prerequisites
To trigger this vulnerability, an attacker needs local access to a system with an f2fs filesystem mounted and the ability to execute the fallocate() system call on a file within that filesystem. No special privileges are required beyond the ability to write to a file and invoke fallocate, making it a low-complexity local attack vector. The bug is triggered during error handling—when f2fs_zero_range takes an error path, it incorrectly adds a zero-length extent without first sanitizing its length [1].
Impact
Successful exploitation results in a kernel BUG and subsequent system crash, causing a denial-of-service condition. An attacker can repeatedly trigger the vulnerability to render the system unavailable. There is no evidence of privilege escalation or information disclosure; the impact is limited to availability [1].
Mitigation
Status The vulnerability was fixed in the Linux kernel by the commit referenced in [1] and backported to stable kernels as indicated by the commits in [2] and [3]. The fix adds a check to prevent inserting extents with zero length into the cache. Users should apply the latest kernel updates from their distribution or build a kernel containing the fix. No workaround is available; the only mitigation is to apply the patch.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- git.kernel.org/stable/c/4f244c64efe628d277b916f47071adf480eb8646nvd
- git.kernel.org/stable/c/72c58a82e6fb7b327e8701f5786c70c3edc56188nvd
- git.kernel.org/stable/c/7c37c79510329cd951a4dedf3f7bf7e2b18dccecnvd
- git.kernel.org/stable/c/9c07bd262c13ca922adad6e7613d48505f97f548nvd
- git.kernel.org/stable/c/bac23833220a1f8fe8dfab7e16efa20ff64d7589nvd
- git.kernel.org/stable/c/e50b81c50fcbe63f50405bb40f262162ff32af88nvd
- git.kernel.org/stable/c/efe3371001f50a2d6f746b50bdc6f9f26b2089ecnvd
News mentions
0No linked articles in our index yet.