CVE-2025-38707
Description
In the Linux kernel, the following vulnerability has been resolved:
fs/ntfs3: Add sanity check for file name
The length of the file name should be smaller than the directory entry size.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A missing sanity check in Linux kernel's NTFS3 driver can allow a malformed file name to cause memory corruption or buffer over-read.
Root
Cause
In the Linux kernel's NTFS3 filesystem driver (fs/ntfs3), the code lacked a sanity check ensuring that the length of a file name is smaller than the directory entry size [1]. This oversight can lead to memory corruption or other security violations when processing specially crafted NTFS directory entries.
Exploitation
An attacker who can control an NTFS filesystem image (e.g., by mounting a malicious USB drive or network share) could provide a directory entry with an overly long file name. No authentication or special privileges are needed beyond the ability to trigger a mount of the crafted volume. The vulnerability lies in the kernel's handling of the directory entry parsing, so it is accessible from user space through filesystem operations [1].
Impact
A successful exploit could lead to kernel memory corruption, potentially allowing an attacker to crash the system (denial of service) or, with further exploitation, achieve local privilege escalation. The CVSS v3 score of 7.8 (High) reflects the potential for high impact on confidentiality, integrity, and availability, assuming local access and low privileges [1].
Mitigation
Patches have been committed to the Linux kernel stable branches, as referenced in commits [2][3][4]; vendors such as Siemens have acknowledged the CVE in affected products like SIMATIC CN 4100 and recommend updating to fixed versions [1]. System administrators should apply the latest kernel updates from their distribution and ensure any NTFS3 usage is patched.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
4- cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
- Linux/Linuxv5Range: 5.15
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
9- git.kernel.org/stable/c/27ee9a42b245efe6529e28b03453291a775cb3e4nvdPatch
- git.kernel.org/stable/c/2ac47f738ddfc1957a33be163bc97ee8f78e85a6nvdPatch
- git.kernel.org/stable/c/3572737a768dadea904ebc4eb34b6ed575bb72d9nvdPatch
- git.kernel.org/stable/c/b51642fc52d1c7243a9361555d5c4b24d7569d7envdPatch
- git.kernel.org/stable/c/bde58c1539f3ffddffc94d64007de16964e6b8ebnvdPatch
- git.kernel.org/stable/c/e841ecb139339602bc1853f5f09daa5d1ea920a2nvdPatch
- git.kernel.org/stable/c/f99eb9a641f4ef927d8724f4966dcfd1f0e9f835nvdPatch
- lists.debian.org/debian-lts-announce/2025/10/msg00008.htmlnvdMailing ListThird Party Advisory
- cert-portal.siemens.com/productcert/html/ssa-032379.htmlnvd
News mentions
1- Siemens SIMATICCISA ICS Advisories