CVE-2025-71267

Source
https://cve.org/CVERecord?id=CVE-2025-71267
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-71267.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-71267
Downstream
Published
2026-03-18T10:05:04.008Z
Modified
2026-04-02T13:04:59.432252Z
Summary
fs: ntfs3: fix infinite loop triggered by zero-sized ATTR_LIST
Details

In the Linux kernel, the following vulnerability has been resolved:

fs: ntfs3: fix infinite loop triggered by zero-sized ATTR_LIST

We found an infinite loop bug in the ntfs3 file system that can lead to a Denial-of-Service (DoS) condition.

A malformed NTFS image can cause an infinite loop when an ATTR_LIST attribute indicates a zero data size while the driver allocates memory for it.

When ntfsloadattrlist() processes a resident ATTRLIST with datasize set to zero, it still allocates memory because of alaligned(0). This creates an inconsistent state where ni->attrlist.size is zero, but ni->attrlist.le is non-null. This causes nienumattrex to incorrectly assume that no attribute list exists and enumerates only the primary MFT record. When it finds ATTRLIST, the code reloads it and restarts the enumeration, repeating indefinitely. The mount operation never completes, hanging the kernel thread.

This patch adds validation to ensure that datasize is non-zero before memory allocation. When a zero-sized ATTRLIST is detected, the function returns -EINVAL, preventing a DoS vulnerability.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/71xxx/CVE-2025-71267.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
be71b5cba2e6485e8959da7a9f9a44461a1bb074
Fixed
9267d99fade76d44d4a133599524031fe684156e
Fixed
976e6a7c51fabf150478decbe8ef5d9a26039b7c
Fixed
8d8c70b57dbeda3eb165c0940b97e85373ca9354
Fixed
7ef219656febf5ae06ae56b1fce47ebd05f92b68
Fixed
9779a6eaaabdf47aa57910d352b398ad742e6a5f
Fixed
fd508939dbca5eceefb2d0c2564beb15469572f2
Fixed
06909b2549d631a47fcda249d34be26f7ca1711d

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-71267.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.15.0
Fixed
5.15.202
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.165
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.128
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.12.75
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.18.16
Type
ECOSYSTEM
Events
Introduced
6.19.0
Fixed
6.19.6

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-71267.json"