CVE-2025-40067

Source
https://cve.org/CVERecord?id=CVE-2025-40067
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-40067.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-40067
Downstream
Related
Published
2025-10-28T11:48:37.034Z
Modified
2026-03-20T12:43:09.960994Z
Summary
fs/ntfs3: reject index allocation if $BITMAP is empty but blocks exist
Details

In the Linux kernel, the following vulnerability has been resolved:

fs/ntfs3: reject index allocation if $BITMAP is empty but blocks exist

Index allocation requires at least one bit in the $BITMAP attribute to track usage of index entries. If the bitmap is empty while index blocks are already present, this reflects on-disk corruption.

syzbot triggered this condition using a malformed NTFS image. During a rename() operation involving a long filename (which spans multiple index entries), the empty bitmap allowed the name to be added without valid tracking. Subsequent deletion of the original entry failed with -ENOENT, due to unexpected index state.

Reject such cases by verifying that the bitmap is not empty when index blocks exist.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/40xxx/CVE-2025-40067.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
b35a50d639ca5259466ef5fea85529bb4fb17d5b
Fixed
978aac54e93ea35aab20b32ae393d3d33964e7ae
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
3ed2cc6a6e93fbeb8c0cafce1e7fb1f64a331dcc
Fixed
be66551da203862c689c12e1d35ce87217c017c1
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
d99208b91933fd2a58ed9ed321af07dacd06ddc3
Fixed
039ddf353cc33f6546a87ec1ac3210637d714bec
Fixed
0dc7117da8f92dd5fe077d712a756eccbe377d40
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
358d4f821c03add421a4c49290538a705852ccf1
Last affected
a285395020780adac1ffbc844069c3d700bf007a

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-40067.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.6.112
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.12.53
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.17.3

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-40067.json"