Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-40198

Опубликовано: 12 нояб. 2025
Источник: redhat
CVSS3: 4.4

Описание

In the Linux kernel, the following vulnerability has been resolved: ext4: avoid potential buffer over-read in parse_apply_sb_mount_options() Unlike other strings in the ext4 superblock, we rely on tune2fs to make sure s_mount_opts is NUL terminated. Harden parse_apply_sb_mount_options() by treating s_mount_opts as a potential __nonstring.

A buffer over-read vulnerability was found in the Linux kernel's ext4 filesystem when parsing mount options stored in the superblock. A local user can trigger this issue by mounting a maliciously crafted ext4 filesystem where the s_mount_opts string field lacks proper NULL termination. During mount option parsing, the code reads beyond the field's boundaries searching for the terminator, potentially accessing invalid memory and causing kernel crashes or denial of service.

Отчет

The s_mount_opts field in ext4 superblocks is parsed at mount time, with the kernel relying on tune2fs to ensure NUL termination. If a malicious image lacks proper termination, parse_apply_sb_mount_options walks past the field boundary searching for the NUL byte, potentially reading adjacent superblock fields or unmapped memory. The fix treats s_mount_opts as potentially unterminated and adds explicit bounds checking during parsing.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10kernelFix deferred
Red Hat Enterprise Linux 6kernelOut of support scope
Red Hat Enterprise Linux 7kernelFix deferred
Red Hat Enterprise Linux 7kernel-rtFix deferred
Red Hat Enterprise Linux 8kernelFix deferred
Red Hat Enterprise Linux 8kernel-rtFix deferred
Red Hat Enterprise Linux 9kernelFix deferred
Red Hat Enterprise Linux 9kernel-rtFix deferred

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-170
https://bugzilla.redhat.com/show_bug.cgi?id=2414744kernel: ext4: avoid potential buffer over-read in parse_apply_sb_mount_options()

4.4 Medium

CVSS3

Связанные уязвимости

ubuntu
4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: ext4: avoid potential buffer over-read in parse_apply_sb_mount_options() Unlike other strings in the ext4 superblock, we rely on tune2fs to make sure s_mount_opts is NUL terminated. Harden parse_apply_sb_mount_options() by treating s_mount_opts as a potential __nonstring.

nvd
4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: ext4: avoid potential buffer over-read in parse_apply_sb_mount_options() Unlike other strings in the ext4 superblock, we rely on tune2fs to make sure s_mount_opts is NUL terminated. Harden parse_apply_sb_mount_options() by treating s_mount_opts as a potential __nonstring.

CVSS3: 7.8
msrc
4 месяца назад

ext4: avoid potential buffer over-read in parse_apply_sb_mount_options()

debian
4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: e ...

github
4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: ext4: avoid potential buffer over-read in parse_apply_sb_mount_options() Unlike other strings in the ext4 superblock, we rely on tune2fs to make sure s_mount_opts is NUL terminated. Harden parse_apply_sb_mount_options() by treating s_mount_opts as a potential __nonstring.

4.4 Medium

CVSS3