CVE-2025-38230
BaseFortify
Publication date: 2025-07-04
Last updated on: 2025-12-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 2.6.13 (inc) to 5.4.296 (exc) |
| linux | linux_kernel | From 5.5 (inc) to 5.10.240 (exc) |
| linux | linux_kernel | From 5.11 (inc) to 5.15.187 (exc) |
| linux | linux_kernel | From 5.16 (inc) to 6.1.143 (exc) |
| linux | linux_kernel | From 6.2 (inc) to 6.6.96 (exc) |
| linux | linux_kernel | From 6.7 (inc) to 6.12.36 (exc) |
| linux | linux_kernel | From 6.13 (inc) to 6.15.4 (exc) |
| linux | linux_kernel | 2.6.12 |
| linux | linux_kernel | 2.6.12 |
| linux | linux_kernel | 2.6.12 |
| linux | linux_kernel | 2.6.12 |
| linux | linux_kernel | 2.6.12 |
| debian | debian_linux | 11.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's JFS (Journaled File System) involves improper validation of allocation group (AG) parameters in the dbMount() function. Specifically, parameters like db_agheight, db_agwidth, and db_agstart were not properly validated, which could lead to corrupted metadata and undefined behavior such as crashes due to out-of-bounds shifts in the code. The fix involves validating these parameters against certain limits to prevent such issues.
How can this vulnerability impact me? :
This vulnerability can cause crashes in the Linux kernel when using the JFS file system due to corrupted metadata and invalid parameter values. Such crashes may lead to system instability, potential data loss, or denial of service conditions on affected systems.