CVE-2025-40082
BaseFortify
Publication date: 2025-10-28
Last updated on: 2026-02-26
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.10.241 (inc) to 5.11 (exc) |
| linux | linux_kernel | From 5.4.297 (inc) to 5.5 (exc) |
| linux | linux_kernel | From 6.15.11 (inc) to 6.16 (exc) |
| linux | linux_kernel | From 5.15.190 (inc) to 5.15.200 (exc) |
| linux | linux_kernel | From 6.1.149 (inc) to 6.1.163 (exc) |
| linux | linux_kernel | From 6.12.43 (inc) to 6.12.70 (exc) |
| linux | linux_kernel | From 6.16.2 (inc) to 6.17.3 (exc) |
| linux | linux_kernel | From 6.6.103 (inc) to 6.6.124 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-125 | The product reads data past the end, or before the beginning, of the intended buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a slab-out-of-bounds read in the Linux kernel's HFS+ filesystem code, specifically in the function hfsplus_uni2asc. It occurs because the function processes unicode buffers with incorrect assumptions about their size, leading to reading beyond allocated memory. The issue arises when hfsplus_uni2asc is called from hfsplus_listxattr with a struct hfsplus_attr_unistr pointer, which has a different size than expected. This causes the pointer to go beyond allocated memory, potentially leading to memory corruption or crashes. The fix involves introducing wrapper functions to correctly handle the two different unicode buffer types and limit the length to a safe size.
How can this vulnerability impact me? :
This vulnerability can lead to out-of-bounds memory reads in the kernel, which may cause system instability, crashes, or potentially allow an attacker to leak sensitive kernel memory. While the description does not explicitly mention privilege escalation or code execution, such memory safety issues can be exploited in various ways depending on the context and attacker capabilities.