CVE-2025-40137
BaseFortify
Publication date: 2025-11-12
Last updated on: 2025-11-12
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is in the Linux kernel's F2FS filesystem implementation. It occurs because during the inode eviction process, the code fails to properly truncate the first page in the page cache in an error path of the f2fs_truncate() function. Specifically, when an inline inode conversion fails a sanity check, a page (#0) is created in the cache but not dropped, leading to inode data inconsistency. This causes a kernel bug and potential filesystem corruption.
How can this vulnerability impact me? :
This vulnerability can lead to filesystem corruption and kernel bugs, which may cause system instability or crashes. It can affect data integrity on systems using the F2FS filesystem, potentially resulting in data loss or the need to run filesystem checks (fsck) to repair corrupted inodes.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by observing kernel logs for specific error messages related to the f2fs filesystem, such as 'detected capacity change', 'Wrong SSA boundary', 'Can't find valid F2FS filesystem in 1th superblock', 'invalid crc value', or kernel BUG messages at fs/inode.c:753. Running filesystem checks (fsck) on the affected f2fs partitions may also reveal corruption. Specific commands to check kernel logs include 'dmesg | grep f2fs' or 'journalctl -k | grep f2fs'. Running 'fsck.f2fs' on the affected filesystem can help detect and fix corruption.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include running filesystem checks (fsck) on the affected f2fs partitions to fix corruption, avoiding mounting or using corrupted f2fs filesystems until patched, and updating the Linux kernel to a version where this vulnerability is fixed. Monitoring kernel logs for related errors can help identify affected systems.