CVE-2025-38282
BaseFortify
Publication date: 2025-07-10
Last updated on: 2025-12-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 6.13 (inc) to 6.15.3 (inc) |
| debian | debian_linux | 11.0 |
| linux | kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability relates to the Linux kernel's kernfs subsystem where a constraint in the draining guard mechanism was too sensitive, causing false positive warnings. The issue involves the active reference lifecycle's break/unbreak mechanism not being properly accounted for, leading to warnings during normal operation. The fix removes the overly sensitive check to prevent these false positives.
How can this vulnerability impact me? :
The vulnerability can cause false positive warnings in the kernel, which might lead to unnecessary kernel panics if panic_on_warn is enabled. This could affect system stability by triggering unwarranted error handling during normal kernel operations.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is related to a sensitive WARN check in the Linux kernel's kernfs_should_drain_open_files() function that may cause false positives and potential panics. The immediate mitigation is to apply the patch that removes this WARN check altogether to avoid false positives and panics. Since this is a kernel-level issue, updating the Linux kernel to a version that includes this fix is the recommended immediate step.