{"id":"CVE-2025-40200","summary":"Squashfs: reject negative file sizes in squashfs_read_inode()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nSquashfs: reject negative file sizes in squashfs_read_inode()\n\nSyskaller reports a \"WARNING in ovl_copy_up_file\" in overlayfs.\n\nThis warning is ultimately caused because the underlying Squashfs file\nsystem returns a file with a negative file size.\n\nThis commit checks for a negative file size and returns EINVAL.\n\n[phillip@squashfs.org.uk: only need to check 64 bit quantity]","modified":"2026-04-02T12:48:19.372137Z","published":"2025-11-12T21:56:33.783Z","related":["SUSE-SU-2025:4393-1","SUSE-SU-2025:4422-1","SUSE-SU-2025:4505-1","SUSE-SU-2025:4516-1","SUSE-SU-2025:4517-1","SUSE-SU-2025:4521-1","SUSE-SU-2026:0316-1","SUSE-SU-2026:20012-1","SUSE-SU-2026:20015-1","SUSE-SU-2026:20021-1","SUSE-SU-2026:20039-1","SUSE-SU-2026:20059-1","SUSE-SU-2026:20473-1","SUSE-SU-2026:20496-1","openSUSE-SU-2025:20172-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/40xxx/CVE-2025-40200.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/2871c74caa3f4f05b429e6bfefebac62dbf1b408"},{"type":"WEB","url":"https://git.kernel.org/stable/c/54170057a5fadd24a37b70de41e61d39284d9bd7"},{"type":"WEB","url":"https://git.kernel.org/stable/c/8118f66124895829443d09c207e654adcb2f9321"},{"type":"WEB","url":"https://git.kernel.org/stable/c/875fb3f87ae0225b881319ba016a1a8c4ffd5812"},{"type":"WEB","url":"https://git.kernel.org/stable/c/8c7aad76751816207fee556d44aa88a710824810"},{"type":"WEB","url":"https://git.kernel.org/stable/c/9f1c14c1de1bdde395f6cc893efa4f80a2ae3b2b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f271155ff31aca8ef82c61c8df23ca97e9a77dd4"},{"type":"WEB","url":"https://git.kernel.org/stable/c/fbfc745db628de31f5c089147deeb87e95b89e66"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/40xxx/CVE-2025-40200.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-40200"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"6545b246a2c815a8fcd07d58240effb6ec3481b1"},{"fixed":"54170057a5fadd24a37b70de41e61d39284d9bd7"},{"fixed":"2871c74caa3f4f05b429e6bfefebac62dbf1b408"},{"fixed":"fbfc745db628de31f5c089147deeb87e95b89e66"},{"fixed":"8118f66124895829443d09c207e654adcb2f9321"},{"fixed":"8c7aad76751816207fee556d44aa88a710824810"},{"fixed":"875fb3f87ae0225b881319ba016a1a8c4ffd5812"},{"fixed":"f271155ff31aca8ef82c61c8df23ca97e9a77dd4"},{"fixed":"9f1c14c1de1bdde395f6cc893efa4f80a2ae3b2b"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-40200.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"2.6.29"},{"fixed":"5.4.301"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.5.0"},{"fixed":"5.10.246"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.195"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.157"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.6.113"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.7.0"},{"fixed":"6.12.54"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.13.0"},{"fixed":"6.17.4"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-40200.json"}}],"schema_version":"1.7.5"}