CVE-2025-40362

N/A Unknown

📋 TL;DR

A Linux kernel Ceph filesystem vulnerability allows users to bypass intended access controls in multi-filesystem Ceph clusters. When a user has different permissions on different filesystems, the bug incorrectly applies permissions from one filesystem to another, potentially granting unauthorized read/write access. This affects systems using Ceph multi-filesystem configurations with user-based authentication.

💻 Affected Systems

Products:
  • Linux kernel Ceph filesystem module
Versions: Linux kernel versions with vulnerable Ceph code (specific versions not provided in CVE, but patches available for stable branches)
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ✅ No
Notes: Only affects systems using Ceph multi-filesystem (multifs) configurations with user-based authentication. Single filesystem deployments are not vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Unauthorized users gain full read/write access to sensitive filesystems, potentially leading to data theft, data destruction, or privilege escalation in multi-tenant environments.

🟠

Likely Case

Users with limited permissions on one filesystem gain unintended write access, potentially modifying or deleting files they shouldn't have access to.

🟢

If Mitigated

If proper network segmentation and access controls are in place, the impact is limited to users who already have some level of authenticated access to the Ceph cluster.

🌐 Internet-Facing: LOW - Ceph clusters are typically deployed in internal/private networks, not directly internet-facing.
🏢 Internal Only: MEDIUM - Affects internal Ceph deployments where multi-filesystem configurations with different user permissions are used.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW - Exploitation requires authenticated access to the Ceph cluster and knowledge of the multi-filesystem configuration.

Exploitation requires existing user credentials and access to mount Ceph filesystems. The bug is demonstrated in the CVE description with specific mount commands.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Patches available in stable kernel branches via the provided git.kernel.org links

Vendor Advisory: https://git.kernel.org/stable/c/07640d34a781bb2e39020a39137073c03c4aa932

Restart Required: Yes

Instructions:

1. Update Linux kernel to patched version. 2. For Ceph client systems: Update kernel and restart. 3. For Ceph server systems: Update kernel and restart MDS (Metadata Server) services. 4. Verify all Ceph mounts use updated kernel.

🔧 Temporary Workarounds

Use single filesystem configuration

linux

Avoid using multi-filesystem Ceph configurations until patched

Restrict user access

linux

Apply uniform permissions across all filesystems for each user to prevent permission mismatch exploitation

ceph fs authorize <fsname> <user> <path> <permissions> # Apply same permissions across all filesystems

🧯 If You Can't Patch

  • Implement strict network segmentation to limit Ceph cluster access to only necessary users/systems
  • Enable detailed audit logging on Ceph MDS and monitor for unauthorized file operations across filesystem boundaries

🔍 How to Verify

Check if Vulnerable:

Check if system uses Ceph multi-filesystem configuration and test user permissions across different filesystems as described in CVE reproduction steps

Check Version:

uname -r # Check kernel version, then verify it includes the Ceph patches

Verify Fix Applied:

After patching, repeat the reproduction steps from CVE description to confirm users cannot write to filesystems where they only have read permissions

📡 Detection & Monitoring

Log Indicators:

  • Ceph MDS logs showing 'fsname mismatch' warnings
  • Unexpected file create/delete operations by users on filesystems where they shouldn't have write permissions

Network Indicators:

  • Unusual Ceph client mount patterns across multiple filesystems

SIEM Query:

source="ceph-mds.log" AND ("fsname check failed" OR "fsname mismatch") OR source="audit.log" AND process="mount.ceph" AND user_change_between_filesystems

🔗 References

📤 Share & Export