CVE-2025-40287

Source
https://cve.org/CVERecord?id=CVE-2025-40287
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-40287.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-40287
Downstream
Related
Published
2025-12-06T21:51:13.328Z
Modified
2026-03-12T03:54:38.382551Z
Summary
exfat: fix improper check of dentry.stream.valid_size
Details

In the Linux kernel, the following vulnerability has been resolved:

exfat: fix improper check of dentry.stream.valid_size

We found an infinite loop bug in the exFAT file system that can lead to a Denial-of-Service (DoS) condition. When a dentry in an exFAT filesystem is malformed, the following system calls — SYSopenat, SYSftruncate, and SYS_pwrite64 — can cause the kernel to hang.

Root cause analysis shows that the size validation code in exfatfind() does not check whether dentry.stream.validsize is negative. As a result, the system calls mentioned above can succeed and eventually trigger the DoS issue.

This patch adds a check for negative dentry.stream.valid_size to prevent this vulnerability.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/40xxx/CVE-2025-40287.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
11a347fb6cef62ce47e84b97c45f2b2497c7593b
Fixed
6c627bcc1896ba62ec793d0c00da74f3c93ce3ad
Fixed
204b1b02ee018ba52ad2ece21fe3a8643d66a1b2
Fixed
82ebecdc74ff555daf70b811d854b1f32a296bea

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-40287.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.8.0
Fixed
6.12.59
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.17.9

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-40287.json"