VYPR
Unrated severityNVD Advisory· Published Dec 8, 2025· Updated Apr 15, 2026

CVE-2025-40312

CVE-2025-40312

Description

In the Linux kernel, the following vulnerability has been resolved:

jfs: Verify inode mode when loading from disk

The inode mode loaded from corrupted disk can be invalid. Do like what commit 0a9e74051313 ("isofs: Verify inode mode when loading from disk") does.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

CVE-2025-40312: A missing validation of inode mode in JFS filesystem can lead to invalid modes being loaded from a corrupted disk, potentially causing unsupported operations.

Vulnerability

Overview

CVE-2025-40312 is a vulnerability in the Linux kernel's JFS (Journaled File System) implementation. The inode mode loaded from disk is not validated, allowing a corrupted or maliciously crafted filesystem image to specify an invalid mode. This is analogous to the fix applied to the isofs filesystem in commit 0a9e74051313 [1][2].

Exploitation

An attacker with the ability to mount a crafted JFS filesystem image—for example, through a removable device or a network filesystem—can trigger this flaw. No special privileges beyond the ability to mount a filesystem are required. The invalid mode can cause the kernel to attempt unsupported file operations or enter unexpected code paths, leading to a denial-of-service condition or potential memory corruption.

Impact

Successful exploitation can result in a system crash (local) denial of service via kernel panic or crashes, or potentially causing system instability. The vulnerability does not appear to provide remote code execution or privilege escalation on its own, but it could be used as a component in a broader attack chain.

Mitigation

The fix has been backported to stable kernel versions, as seen in the referenced commits [1][2][3]. System administrators should update to the latest patched kernel versions for their distribution. As a defense-in-depth measure, avoid mounting untrusted filesystem images.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

3

Patches

8

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

8

News mentions

0

No linked articles in our index yet.