CVE-2025-40243
BaseFortify
Publication date: 2025-12-04
Last updated on: 2025-12-04
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.16.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an uninitialized value issue in the Linux kernel's HFS filesystem code, specifically in the function hfs_find_set_zero_bits(). The problem arises because memory allocated with kmalloc() is not cleared, potentially containing leftover 'garbage' data. This uninitialized memory can affect bitmap operations used by the filesystem, leading to incorrect behavior or bugs. The fix replaces kmalloc() with kzalloc(), which zeroes the allocated memory, ensuring the bitmap is correctly initialized and preventing potential volume corruption or filesystem driver bugs.
How can this vulnerability impact me? :
This vulnerability can lead to incorrect bitmap operations in the HFS filesystem, which may cause volume corruption or filesystem driver bugs. This could result in data integrity issues, unexpected filesystem behavior, or crashes when using the affected filesystem on Linux systems.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the Linux kernel to a version that includes the patch fixing the uninitialized memory issue in hfs_find_set_zero_bits(). The patch replaces kmalloc() with kzalloc() to ensure allocated memory is zeroed, preventing potential volume corruption and filesystem driver bugs.