CVE-2025-71237

Source
https://cve.org/CVERecord?id=CVE-2025-71237
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-71237.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-71237
Downstream
Related
Published
2026-02-18T14:53:22.436Z
Modified
2026-03-19T08:59:08.838700Z
Summary
nilfs2: Fix potential block overflow that cause system hang
Details

In the Linux kernel, the following vulnerability has been resolved:

nilfs2: Fix potential block overflow that cause system hang

When a user executes the FITRIM command, an underflow can occur when calculating nblocks if endblock is too small. Since nblocks is of type sectort, which is u64, a negative nblocks value will become a very large positive integer. This ultimately leads to the block layer function __blkdevissuediscard() taking an excessively long time to process the bio chain, and the nssegctorsem lock remains held for a long period. This prevents other tasks from acquiring the nssegctorsem lock, resulting in the hang reported by syzbot in [1].

If the ending block is too small, typically if it is smaller than 4KiB range, depending on the usage of the segment 0, it may be possible to attempt a discard request beyond the device size causing the hang.

Exiting successfully and assign the discarded size (0 in this case) to range->len.

Although the start and len values in the user input range are too small, a conservative strategy is adopted here to safely ignore them, which is equivalent to a no-op; it will not perform any trimming and will not throw an error.

[1] task:segctord state:D stack:28968 pid:6093 tgid:6093 ppid:2 taskflags:0x200040 flags:0x00080000 Call Trace: rwbasewritelock+0x3dd/0x750 kernel/locking/rwbasert.c:272 nilfstransactionlock+0x253/0x4c0 fs/nilfs2/segment.c:357 nilfssegctorthreadconstruct fs/nilfs2/segment.c:2569 [inline] nilfssegctor_thread+0x6ec/0xe00 fs/nilfs2/segment.c:2684

[ryusuke: corrected part of the commit message about the consequences]

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/71xxx/CVE-2025-71237.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
82e11e857be3ffd2a0a952c9db8aa2379e2b9e44
Fixed
6457d3ee41a4c15082ac49c5aa7fb933b4a043f3
Fixed
ba18e5f22f26aa4ef78bc3e81f639d1d4f3845e6
Fixed
2438982f635e6cc2009be68ba2efb2998727d8d4
Fixed
df1e20796c9f3d541cca47fb72e4369ea135642d
Fixed
ea2278657ad0d62596589fbe2caf995e189e65e7
Fixed
4aa45f841413cca81882602b4042c53502f34cad
Fixed
b8c5ee234bd54f1447c846101fdaef2cf70c2149
Fixed
ed527ef0c264e4bed6c7b2a158ddf516b17f5f66

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-71237.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
3.15.0
Fixed
5.10.251
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.201
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.164
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.125
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.12.72
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.18.11
Type
ECOSYSTEM
Events
Introduced
6.19.0
Fixed
6.19.1

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-71237.json"