CVE-2025-40179
BaseFortify
Publication date: 2025-11-12
Last updated on: 2025-11-14
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the ext4 filesystem in the Linux kernel where orphan files can be arbitrarily large. During orphan replay, the system needs to traverse the entire orphan file and pins all its buffers in memory. If the orphan file is excessively large, it can consume a large amount of memory, potentially leading to resource exhaustion. The fix limits the orphan file size to a reasonable value and changes memory allocation methods to avoid large memory allocations for large but sane orphan files.
How can this vulnerability impact me? :
If exploited or triggered, this vulnerability can cause the system to consume excessive memory due to very large orphan files in the ext4 filesystem. This can lead to degraded system performance, potential denial of service, or instability as memory resources are exhausted or heavily strained.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the Linux kernel to a version that includes the fix for limiting orphan file size and uses kvmalloc() for memory allocation as described. This will prevent excessive memory consumption caused by large orphan files.