CVE-2025-40068

Source
https://cve.org/CVERecord?id=CVE-2025-40068
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-40068.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-40068
Downstream
Related
Published
2025-10-28T11:48:37.636Z
Modified
2026-03-20T12:43:10.134749Z
Summary
fs: ntfs3: Fix integer overflow in run_unpack()
Details

In the Linux kernel, the following vulnerability has been resolved:

fs: ntfs3: Fix integer overflow in run_unpack()

The MFT record relative to the file being opened contains its runlist, an array containing information about the file's location on the physical disk. Analysis of all Call Stack paths showed that the values of the runlist array, from which LCNs are calculated, are not validated before run_unpack function.

The rununpack function decodes the compressed runlist data format from MFT attributes (for example, $DATA), converting them into a runstree structure, which describes the mapping of virtual clusters (VCN) to logical clusters (LCN). The NTFS3 subsystem also has a shortcut for deleting files from MFT records - in this case, the RUNDEALLOCATE command is sent to the rununpack input, and the function logic provides that all data transferred to the runlist about file or directory is deleted without creating a runs_tree structure.

Substituting the runlist in the $DATA attribute of the MFT record for an arbitrary file can lead either to access to arbitrary data on the disk bypassing access checks to them (since the inode access check occurs above) or to destruction of arbitrary data on the disk.

Add overflow check for addition operation.

Found by Linux Verification Center (linuxtesting.org) with SVACE.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/40xxx/CVE-2025-40068.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
4342306f0f0d5ff4315a204d315c1b51b914fca5
Fixed
f6b36cfd25cbadad63447c673743cf771090e756
Fixed
3ac37e100385b59ac821a62118494442238aaac4
Fixed
a86c8b9d03f7101e1750233846fe989df6f0d631
Fixed
9378cfe228c2c679564a4116bcb28c8e89dff989
Fixed
5aa5799d162ad1b8e8b699d48b6218143c695a78
Fixed
736fc7bf5f68f6b74a0925b7e072c571838657d2

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-40068.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.15.0
Fixed
5.15.195
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.156
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.112
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.12.53
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.17.3

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-40068.json"