Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: smb: client: add NULL check in automount_fullpath page is checked for null in __build_path_from_dentry_optional_prefix when tcon->origin_fullpath is not set. However, the check is missing when it is set. Add a check to prevent a potential NULL pointer dereference.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | < 6.6.95 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/37166d63e42c34846a16001950ecec96229a8d17Patch
- https://git.kernel.org/stable/c/a9e916fa5c7d0ec2256aa44aa24ddd92f529ce35Patch
- https://git.kernel.org/stable/c/cce8e71ca1f7ad9045707f0d22490c1e9ed1df6cPatch
- https://git.kernel.org/stable/c/f1e7a277a1736e12cc4bd6d93b8a5c439b8ca20cPatch
FAQ
What is CVE-2025-38208?
CVE-2025-38208 is a vulnerability with a CVSS score of 5.5 (MEDIUM). In the Linux kernel, the following vulnerability has been resolved: smb: client: add NULL check in automount_fullpath page is checked for null in __build_path_from_dentry_optional_prefix when tcon->...
How severe is CVE-2025-38208?
CVE-2025-38208 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-38208?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.