CVE-2025-40306

Source
https://cve.org/CVERecord?id=CVE-2025-40306
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-40306.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-40306
Downstream
Related
Published
2025-12-08T00:46:31.514Z
Modified
2026-03-12T03:54:38.412748Z
Summary
orangefs: fix xattr related buffer overflow...
Details

In the Linux kernel, the following vulnerability has been resolved:

orangefs: fix xattr related buffer overflow...

Willy Tarreau w@1wt.eu forwarded me a message from Disclosure disclosure@aisle.com with the following warning:

The helper xattr_key() uses the pointer variable in the loop condition rather than dereferencing it. As key is incremented, it remains non-NULL (until it runs into unmapped memory), so the loop does not terminate on valid C strings and will walk memory indefinitely, consuming CPU or hanging the thread.

I easily reproduced this with setfattr and getfattr, causing a kernel oops, hung user processes and corrupted orangefs files. Disclosure sent along a diff (not a patch) with a suggested fix, which I based this patch on.

After xattrkey started working right, xfstest generic/069 exposed an xattr related memory leak that lead to OOM. xattrkey returns a hashed key. When adding xattrs to the orangefs xattr cache, orangefs used hashadd, a kernel hashing macro. hashadd also hashes the key using hash_log which resulted in additions to the xattr cache going to the wrong hash bucket. generic/069 tortures a single file and orangefs does a getattr for the xattr "security.capability" every time. Orangefs negative caches on xattrs which includes a kmalloc. Since adds to the xattr cache were going to the wrong bucket, every getattr for "security.capability" resulted in another kmalloc, none of which were ever freed.

I changed the two uses of hashadd to hlistadd_head instead and the memory leak ceased and generic/069 quit throwing furniture.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/40xxx/CVE-2025-40306.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
f7ab093f74bf638ed98fd1115f3efa17e308bb7f
Fixed
c6564ff6b53c9a8dc786b6f1c51ae7688273f931
Fixed
ef892d2bf4f3fa2c8de1677dd307e678bdd3d865
Fixed
15afebb9597449c444801d1ff0b8d8b311f950ab
Fixed
bc812574de633cf9a9ad6974490e45f6a4bb5126
Fixed
e09a096104fc65859422817fb2211f35855983fe
Fixed
9127d1e90c90e5960c8bc72a4ce2c209691a7021
Fixed
c2ca015ac109fd743fdde27933d59dc5ad46658e
Fixed
025e880759c279ec64d0f754fe65bf45961da864

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-40306.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.6.0
Fixed
5.4.302
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.247
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.197
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.159
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.117
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.12.58
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.17.8

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-40306.json"