CVE-2025-38208
BaseFortify
Publication date: 2025-07-04
Last updated on: 2025-11-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-476 | The product dereferences a pointer that it expects to be valid but is NULL. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's SMB client involves a missing NULL pointer check in the automount_fullpath function. While a NULL check is performed in one part of the code (__build_path_from_dentry_optional_prefix) when a certain path variable (tcon->origin_fullpath) is not set, the check is missing when this variable is set. This omission can lead to a potential NULL pointer dereference, which is a type of error where the program tries to access memory through a pointer that is NULL, potentially causing a crash or other unintended behavior.
How can this vulnerability impact me? :
The vulnerability can cause a NULL pointer dereference in the Linux kernel SMB client, which may lead to system crashes or instability. This could disrupt services relying on SMB client functionality, potentially causing denial of service or other operational issues.