CVE-2025-40349
BaseFortify
Publication date: 2025-12-16
Last updated on: 2025-12-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's HFS+ filesystem code, specifically in the hfsplus_bmap_alloc function. The function can trigger a crash if a record offset or length is larger than the node size, leading to out-of-bounds memory access. This happens because the function retrieves bitmap data using an offset and length without properly validating them against the node size. If these values are invalid, the code may access memory pages outside the allocated range, causing a crash. The vulnerability was fixed by adding proper validation of both offset and length before use to prevent out-of-bounds page access.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash when handling HFS+ filesystem operations, potentially leading to denial of service. An attacker or a malformed filesystem could exploit this to cause system instability or crashes, affecting system availability.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring kernel logs for crash messages related to hfsplus_bmap_alloc, such as KASAN slab-out-of-bounds errors. You can check the kernel log using the command: dmesg | grep hfsplus_bmap_alloc. Additionally, monitoring for BUG or KASAN messages in dmesg or journalctl logs may help identify attempts to trigger this issue.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include updating the Linux kernel to a version where this vulnerability is patched. Avoid using vulnerable kernel versions with hfsplus filesystem support until patched. If updating is not immediately possible, consider disabling or unmounting hfsplus filesystems to prevent triggering the vulnerable code path.