CVE-2025-40307
BaseFortify
Publication date: 2025-12-08
Last updated on: 2025-12-08
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
What immediate steps should I take to mitigate this vulnerability?
The vulnerability has been resolved by a patch that adds validation of the allocation bitmap clusters in the exfat filesystem driver. Immediate steps should include updating the Linux kernel to a version that includes this patch to ensure the allocation bitmap is properly validated and prevent potential data corruption or reallocation issues.
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's exfat filesystem involves improper validation of cluster allocation bits in the allocation bitmap. Specifically, the exfat filesystem reads and uses the allocation bitmap without verifying that clusters used for the allocation bitmap are correctly marked as in-use. This can lead to cluster 6 being allocated when creating a directory, which causes exfat to zero out that cluster and the allocation bitmap, potentially deleting existing directory entries and allowing reallocation of allocated entries.
How can this vulnerability impact me? :
The vulnerability can lead to data corruption or loss because existing directory entries may be deleted when cluster 6 is zeroed out during directory creation. This can cause reallocation of clusters that should not be reallocated, potentially resulting in loss or corruption of files stored on the exfat filesystem.