Bug 2419881 (CVE-2025-40312)

Summary: CVE-2025-40312 kernel: Linux kernel (JFS): Data corruption, information disclosure, and system unavailability via invalid inode mode.
Product: [Other] Security Response Reporter: OSIDB Bzimport <bzimport>
Component: vulnerabilityAssignee: Product Security DevOps Team <prodsec-dev>
Status: NEW --- QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedKeywords: Security
Target Milestone: ---   
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: ---
Doc Text:
A flaw was found in the Linux kernel’s Journaled File System (JFS) handling code. When inode metadata is read from disk, the inode mode field was not properly validated. If the filesystem is corrupted and presents an invalid mode value, the kernel may accept and act on that invalid mode, potentially leading to unexpected behavior in file operations, memory corruption, or denial of service. This issue could be triggered by a local attacker with access to a crafted or corrupted JFS filesystem.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description OSIDB Bzimport 2025-12-08 07:05:51 UTC
In the Linux kernel, the following vulnerability has been resolved:

jfs: Verify inode mode when loading from disk

The inode mode loaded from corrupted disk can be invalid. Do like what
commit 0a9e74051313 ("isofs: Verify inode mode when loading from disk")
does.