CVE-2025-38615
BaseFortify
Publication date: 2025-08-19
Last updated on: 2025-11-26
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-NVD-CWE-noinfo |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's ntfs3 file system involves improper handling of inodes during a rename operation. Specifically, when renaming a file with a corrupted link, the system may incorrectly mark a live inode as bad because it fails to delete the file name. The root cause is that the function make_bad_inode() is called on an active inode, which can lead to inconsistencies such as evicting the inode from the inode cache while it is still in use.
How can this vulnerability impact me? :
This vulnerability can cause file system inconsistencies by marking valid inodes as bad, potentially leading to data access issues or corruption on NTFS3 file systems. It may disrupt normal file operations like renaming files, which could affect system stability or data integrity.