CVE-2025-40049
BaseFortify
Publication date: 2025-10-28
Last updated on: 2025-10-30
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is in the Linux kernel's Squashfs filesystem. It occurs because the function squashfs_get_parent() accesses an uninitialized 'parent' field when called with a symbolic link inode instead of a directory inode. This happens because non-directory inodes in Squashfs do not have a valid parent value, leading to an uninitialized value access. The issue arises when open_by_handle_at() is called with a file handle containing an invalid parent inode number, specifically that of a symbolic link. The fix involved initializing the parent field with an invalid inode number 0, which causes an error to be returned instead of accessing uninitialized memory.
How can this vulnerability impact me? :
This vulnerability can lead to the Linux kernel accessing uninitialized memory values, which may cause unpredictable behavior, potential crashes, or security issues such as information leakage or privilege escalation. Since it involves kernel code handling filesystem inodes incorrectly, it could be exploited to destabilize the system or bypass security mechanisms.