CVE-2025-71265

Source
https://cve.org/CVERecord?id=CVE-2025-71265
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-71265.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-71265
Downstream
Published
2026-03-18T10:05:01.779Z
Modified
2026-04-02T13:04:59.072217Z
Summary
fs: ntfs3: fix infinite loop in attr_load_runs_range on inconsistent metadata
Details

In the Linux kernel, the following vulnerability has been resolved:

fs: ntfs3: fix infinite loop in attrloadruns_range on inconsistent metadata

We found an infinite loop bug in the ntfs3 file system that can lead to a Denial-of-Service (DoS) condition.

A malformed NTFS image can cause an infinite loop when an attribute header indicates an empty run list, while directory entries reference it as containing actual data. In NTFS, setting evcn=-1 with svcn=0 is a valid way to represent an empty run list, and rununpack() correctly handles this by checking if evcn + 1 equals svcn and returning early without parsing any run data. However, this creates a problem when there is metadata inconsistency, where the attribute header claims to be empty (evcn=-1) but the caller expects to read actual data. When rununpack() immediately returns success upon seeing this condition, it leaves the runstree uninitialized with run->runs as a NULL. The calling function attrloadrunsrange() assumes that a successful return means that the runs were loaded and sets clen to 0, expecting the next runlookupentry() call to succeed. Because runstree remains uninitialized, runlookup_entry() continues to fail, and the loop increments vcn by zero (vcn += 0), leading to an infinite loop.

This patch adds a retry counter to detect when runlookupentry() fails consecutively after attrloadruns_vcn(). If the run is still not found on the second attempt, it indicates corrupted metadata and returns -EINVAL, preventing the Denial-of-Service (DoS) vulnerability.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/71xxx/CVE-2025-71265.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
be71b5cba2e6485e8959da7a9f9a44461a1bb074
Fixed
6f07a590616ff5f57f7c041d98e463fad9e9f763
Fixed
a89bc96d5abd8a4a8d5d911884ea347efcdf460b
Fixed
af839013c70a24779f9d1afb1575952009312d38
Fixed
78b61f7eac37a63284774b147f38dd0be6cad43c
Fixed
c0b43c45d45f59e7faad48675a50231a210c379b
Fixed
3c3a6e951b9b53dab2ac460a655313cf04c4a10a
Fixed
4b90f16e4bb5607fb35e7802eb67874038da4640

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-71265.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.15.0
Fixed
5.15.202
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.165
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.128
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.12.75
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.18.16
Type
ECOSYSTEM
Events
Introduced
6.19.0
Fixed
6.19.6

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-71265.json"