
Cloud Vulnerability DB
A community-led vulnerabilities database
A buffer over-read vulnerability (CVE-2025-40198) was discovered in the Linux kernel's ext4 filesystem component, specifically in the parseapplysbmountoptions() function. The vulnerability was disclosed on November 12, 2025, affecting the ext4 superblock string handling mechanism (NVD, Ubuntu Security).
The vulnerability stems from improper handling of smountopts strings in the ext4 superblock. Unlike other strings in the ext4 superblock, the smountopts field relies on tune2fs to ensure NUL termination, which could lead to a potential buffer over-read condition. The issue was addressed by treating smountopts as a potential _nonstring to harden the parseapplysbmount_options() function (NVD).
The vulnerability affects multiple Linux distributions and versions, including Ubuntu's various releases and kernel variants. Multiple system configurations are impacted, including standard Linux kernels, AWS, Azure, and GCP-specific kernel versions (Ubuntu Security).
The vulnerability has been patched in several Linux distributions and kernel versions. System administrators are advised to update their systems to the latest available kernel versions that include the fix. The patch involves hardening the parseapplysbmountoptions() function to properly handle potentially unterminated strings (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."