{"id":"CVE-2025-40049","summary":"Squashfs: fix uninit-value in squashfs_get_parent","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nSquashfs: fix uninit-value in squashfs_get_parent\n\nSyzkaller reports a \"KMSAN: uninit-value in squashfs_get_parent\" bug.\n\nThis is caused by open_by_handle_at() being called with a file handle\ncontaining an invalid parent inode number.  In particular the inode number\nis that of a symbolic link, rather than a directory.\n\nSquashfs_get_parent() gets called with that symbolic link inode, and\naccesses the parent member field.\n\n\tunsigned int parent_ino = squashfs_i(inode)-\u003eparent;\n\nBecause non-directory inodes in Squashfs do not have a parent value, this\nis uninitialised, and this causes an uninitialised value access.\n\nThe fix is to initialise parent with the invalid inode 0, which will cause\nan EINVAL error to be returned.\n\nRegular inodes used to share the parent field with the block_list_start\nfield.  This is removed in this commit to enable the parent field to\ncontain the invalid inode number 0.","modified":"2026-04-16T04:39:20.465492447Z","published":"2025-10-28T11:48:25.862Z","related":["SUSE-SU-2025:21040-1","SUSE-SU-2025:21052-1","SUSE-SU-2025:21056-1","SUSE-SU-2025:21064-1","SUSE-SU-2025:21080-1","SUSE-SU-2025:21147-1","SUSE-SU-2025:21180-1","SUSE-SU-2025:4057-1","SUSE-SU-2025:4128-1","SUSE-SU-2025:4132-1","SUSE-SU-2025:4140-1","SUSE-SU-2025:4141-1","SUSE-SU-2025:4189-1","SUSE-SU-2025:4301-1","openSUSE-SU-2025:15702-1","openSUSE-SU-2025:20091-1","openSUSE-SU-2026:10301-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/40xxx/CVE-2025-40049.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/1b3ccd0019132880c94bb00ca7088c1749308f82"},{"type":"WEB","url":"https://git.kernel.org/stable/c/382a47fae449e554ef1e8c198667fd2f3270b945"},{"type":"WEB","url":"https://git.kernel.org/stable/c/61d38b5ce2782bff3cacaacbb8164087a73ed1a5"},{"type":"WEB","url":"https://git.kernel.org/stable/c/74058c0a9fc8b2b4d5f4a0ef7ee2cfa66a9e49cf"},{"type":"WEB","url":"https://git.kernel.org/stable/c/81a2bca52d43fc9d9abf07408b91255131c5dc53"},{"type":"WEB","url":"https://git.kernel.org/stable/c/91b99db7a92e57ff48a96a1b10fddfd2547e7f53"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c28b0ca029edf5d0558abcd76cb8c732706cd339"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f81a5bc9e924ee1950e0dd82bd10749048390f6e"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/40xxx/CVE-2025-40049.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-40049"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"122601408d20c77704268f1dea9f9ce4abf997c2"},{"fixed":"f81a5bc9e924ee1950e0dd82bd10749048390f6e"},{"fixed":"382a47fae449e554ef1e8c198667fd2f3270b945"},{"fixed":"61d38b5ce2782bff3cacaacbb8164087a73ed1a5"},{"fixed":"81a2bca52d43fc9d9abf07408b91255131c5dc53"},{"fixed":"c28b0ca029edf5d0558abcd76cb8c732706cd339"},{"fixed":"1b3ccd0019132880c94bb00ca7088c1749308f82"},{"fixed":"91b99db7a92e57ff48a96a1b10fddfd2547e7f53"},{"fixed":"74058c0a9fc8b2b4d5f4a0ef7ee2cfa66a9e49cf"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-40049.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"2.6.29"},{"fixed":"5.4.301"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.5.0"},{"fixed":"5.10.246"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.195"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.156"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.6.112"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.7.0"},{"fixed":"6.12.53"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.13.0"},{"fixed":"6.17.3"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-40049.json"}}],"schema_version":"1.7.5"}