-
CVE-2025-38692
- EPSS 0.03%
- Veröffentlicht 04.09.2025 15:32:46
- Zuletzt bearbeitet 05.09.2025 17:47:24
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- Teams Watchlist Login
- Unerledigt Login
In the Linux kernel, the following vulnerability has been resolved: exfat: add cluster chain loop check for dir An infinite loop may occur if the following conditions occur due to file system corruption. (1) Condition for exfat_count_dir_entries() to loop infinitely. - The cluster chain includes a loop. - There is no UNUSED entry in the cluster chain. (2) Condition for exfat_create_upcase_table() to loop infinitely. - The cluster chain of the root directory includes a loop. - There are no UNUSED entry and up-case table entry in the cluster chain of the root directory. (3) Condition for exfat_load_bitmap() to loop infinitely. - The cluster chain of the root directory includes a loop. - There are no UNUSED entry and bitmap entry in the cluster chain of the root directory. (4) Condition for exfat_find_dir_entry() to loop infinitely. - The cluster chain includes a loop. - The unused directory entries were exhausted by some operation. (5) Condition for exfat_check_dir_empty() to loop infinitely. - The cluster chain includes a loop. - The unused directory entries were exhausted by some operation. - All files and sub-directories under the directory are deleted. This commit adds checks to break the above infinite loop.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
868f23286c1a13162330fa6c614fe350f78e3f82
Version
1acf1a564b6034b5af1e7fb23cb98cb3bb4f6003
Status
affected
Version <
aa8fe7b7b73d4c9a41bb96cb3fb3092f794ecb33
Version
1acf1a564b6034b5af1e7fb23cb98cb3bb4f6003
Status
affected
Version <
e2066ca3ef49a30920d8536fa366b2a183a808ee
Version
1acf1a564b6034b5af1e7fb23cb98cb3bb4f6003
Status
affected
Version <
4c3cda20c4cf1871e27868d08fda06b79bc7d568
Version
1acf1a564b6034b5af1e7fb23cb98cb3bb4f6003
Status
affected
Version <
99f9a97dce39ad413c39b92c90393bbd6778f3fd
Version
1acf1a564b6034b5af1e7fb23cb98cb3bb4f6003
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
5.7
Status
affected
Version <
5.7
Version
0
Status
unaffected
Version <=
6.6.*
Version
6.6.103
Status
unaffected
Version <=
6.12.*
Version
6.12.43
Status
unaffected
Version <=
6.15.*
Version
6.15.11
Status
unaffected
Version <=
6.16.*
Version
6.16.2
Status
unaffected
Version <=
*
Version
6.17-rc1
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.03% | 0.057 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|