CVE-2025-40088
BaseFortify
Publication date: 2025-10-30
Last updated on: 2025-10-30
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a slab-out-of-bounds read in the Linux kernel's hfsplus filesystem code, specifically in the hfsplus_strcasecmp() function. It occurs when the function reads memory beyond the allocated slab, which can lead to kernel memory corruption or crashes.
How can this vulnerability impact me? :
The vulnerability can cause the Linux kernel to crash or behave unpredictably due to out-of-bounds memory reads. This may lead to denial of service or potentially allow attackers to exploit the kernel for further attacks, depending on the context.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring kernel logs for KASAN (Kernel Address Sanitizer) slab-out-of-bounds read errors related to hfsplus_strcasecmp(). You can check the kernel log using the command: dmesg | grep -i 'KASAN: slab-out-of-bounds' or dmesg | grep -i hfsplus_strcasecmp. These logs indicate attempts or occurrences of the out-of-bounds read in the hfsplus filesystem code.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include updating the Linux kernel to a version where the hfsplus_strcasecmp() slab-out-of-bounds read vulnerability is fixed. Until the update is applied, avoid mounting or accessing HFS+ filesystems that could trigger this vulnerability.