CVE-2025-38663
BaseFortify
Publication date: 2025-08-22
Last updated on: 2025-11-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | kernel | 5.10.244-1 |
| linux | kernel | 6.1.153-1 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's nilfs2 filesystem involves the lack of a sanity check when reading inodes from a block device. Specifically, invalid file types in inodes were not properly rejected, which could cause malfunctions or assertion failures in the virtual filesystem (vfs). The fix adds a check to treat invalid file types as filesystem errors to prevent these issues.
How can this vulnerability impact me? :
If exploited or triggered, this vulnerability could cause the Linux kernel's filesystem to malfunction or crash due to invalid inode file types passing through the virtual filesystem layer. This could lead to system instability or denial of service conditions.
What immediate steps should I take to mitigate this vulnerability?
Apply the latest Linux kernel update that includes the fix for rejecting invalid file types when reading inodes in nilfs2. This update adds a sanity check to prevent invalid file types from causing malfunctions or assertion failures.