CVE-2025-40313
Description
In the Linux kernel, the following vulnerability has been resolved:
ntfs3: pretend $Extend records as regular files
Since commit af153bb63a33 ("vfs: catch invalid modes in may_open()") requires any inode be one of S_IFDIR/S_IFLNK/S_IFREG/S_IFCHR/S_IFBLK/ S_IFIFO/S_IFSOCK type, use S_IFREG for $Extend records.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
In the Linux ntfs3 driver, $Extend special records now get S_IFREG type to satisfy VFS validation and prevent mount failures.
Vulnerability
Description
The ntfs3 driver in the Linux kernel failed to assign a valid inode type (S_IFDIR/S_IFLNK/S_IFREG/etc.) to $Extend special records. A kernel change (commit af153bb63a33) in the VFS layer made may_open() strictly validate that every inode belongs to one of the standard file types. This caused the ntfs3 driver to fail the VFS check, leading to mount failures or other operational issues [1][2][3].
Attack
Surface
The vulnerability is triggered simply by mounting an NTFS volume that contains $Extend records (common on modern NTFS filesystems). No special attacker capabilities are required—the kernel's VFS layer denies access to the inode due to the missing type flag. This is a logic/validation issue, not a memory corruption or privilege escalation bug.
Impact
The immediate impact is that filesystem operations on affected NTFS volumes, especially those involving $Extend metadata, may fail. This can prevent the volume from being mounted correctly or cause access errors to certain files. Under normal circumstances, this does not allow arbitrary code execution or privilege escalation, but it does disrupt legitimate filesystem access.
Mitigation
Status
The fix was applied to the Linux kernel stable tree. It assigns S_IFREG to $Extend records, making them pass VFS validation. Users should update to a kernel version containing the fix from commits 78d46f5276ed, 63eb6730ce06, or 4e8011ffec79 [1][2][3].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
3Patches
663eb6730ce0678d46f5276ed17249b2a652737f65e68ba9857534db1bbc44e8011ffec79Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
6- git.kernel.org/stable/c/17249b2a65274f73ed68bcd1604e08a60fd8a278nvd
- git.kernel.org/stable/c/37f65e68ba9852dc51c78dbb54a9881c3f0fe4f7nvd
- git.kernel.org/stable/c/4e8011ffec79717e5fdac43a7e79faf811a384b7nvd
- git.kernel.org/stable/c/57534db1bbc4ca772393bb7d92e69d5e7b9051cfnvd
- git.kernel.org/stable/c/63eb6730ce0604d3eacf036c2f68ea70b068317cnvd
- git.kernel.org/stable/c/78d46f5276ed3589aaaa435580068c5b62efc921nvd
News mentions
0No linked articles in our index yet.