PT-2025-6815 · Linux +3 · Linux Kernel +3
Published
2025-01-01
·
Updated
2025-07-16
·
CVE-2025-0927
8.8
High
Base vector | Vector | AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions:
Linux Kernel versions up to 6.12.0
Ubuntu 22.04 with Linux Kernel 6.5.0-18-generic
Linux Kernel versions 2.x up to 6.13
Description:
The issue is related to a heap overflow vulnerability in the HFS+ file system implementation in the Linux Kernel. An attacker could use a specially crafted file system image that, when mounted, could cause a denial of service or possibly execute arbitrary code. The vulnerability can be exploited to achieve local privilege escalation. Local users can install arbitrary file systems via Udisks2 due to Polkit rules.
Recommendations:
For Linux Kernel versions up to 6.12.0, update to a version that includes the fix for this vulnerability.
For Ubuntu 22.04 with Linux Kernel 6.5.0-18-generic, update to a newer version that includes the fix for this vulnerability.
For Linux Kernel versions 2.x up to 6.13, update to a version that includes the fix for this vulnerability.
As a temporary workaround, consider restricting access to the HFS+ file system implementation until a patch is available.
Avoid using the HFS+ file system implementation until the issue is resolved.
Exploit
Fix
LPE
DoS
Heap Based Buffer Overflow
Buffer Overflow
Memory Corruption
Related Identifiers
Affected Products
References · 3403
- 🔥 https://ssd-disclosure.com/ssd-advisory-linux-kernel-hfsplus-slab-out-of-bounds-write · Exploit
- https://bdu.fstec.ru/vul/2025-01773 · Security Note
- https://bdu.fstec.ru/vul/2025-03500 · Security Note
- https://ubuntu.com/security/CVE-2024-49918 · Vendor Advisory
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53162 · Security Note
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50079 · Security Note
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21644 · Security Note
- https://bdu.fstec.ru/vul/2025-05136 · Security Note
- https://ubuntu.com/security/CVE-2024-57849 · Vendor Advisory
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50249 · Security Note
- https://ubuntu.com/security/CVE-2024-50103 · Vendor Advisory
- https://ubuntu.com/security/CVE-2024-53143 · Vendor Advisory
- https://ubuntu.com/security/CVE-2024-56783 · Vendor Advisory
- https://ubuntu.com/security/CVE-2024-49923 · Vendor Advisory
- https://bdu.fstec.ru/vul/2025-02798 · Security Note