CVE-2025-40044
BaseFortify
Publication date: 2025-10-28
Last updated on: 2025-10-30
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a use-after-free out-of-bounds (OOB) read in the Linux kernel's UDF filesystem driver. It occurs when parsing Allocation Extent Descriptors from on-disk data without properly validating the lengthAllocDescs field against the block size. Malicious or corrupted images can set lengthAllocDescs so that the total descriptor length exceeds the buffer size, causing the function udf_update_tag() to call crc_itu_t() on memory outside the intended bounds. This triggers a Kernel Address Sanitizer (KASAN) use-after-free read, potentially leading to kernel crashes or other undefined behavior.
How can this vulnerability impact me? :
This vulnerability can lead to kernel crashes or instability due to out-of-bounds memory reads triggered by malformed UDF filesystem images. An attacker could exploit this by providing crafted or corrupted UDF images, potentially causing denial of service or other unpredictable kernel behavior. It may also expose the system to further exploitation depending on the kernel's state and configuration.