目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1000

100.0%

CVE-2025-71069— Linux kernel 安全漏洞

EPSS 0.05% · P16
获取后续新漏洞提醒登录后订阅

一、 漏洞 CVE-2025-71069 基础信息

漏洞信息

对漏洞内容有疑问?看看神龙的深度分析是否有帮助!
查看神龙十问 ↗

尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。

Vulnerability Title
f2fs: invalidate dentry cache on failed whiteout creation
来源: 美国国家漏洞数据库 NVD
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: f2fs: invalidate dentry cache on failed whiteout creation F2FS can mount filesystems with corrupted directory depth values that get runtime-clamped to MAX_DIR_HASH_DEPTH. When RENAME_WHITEOUT operations are performed on such directories, f2fs_rename performs directory modifications (updating target entry and deleting source entry) before attempting to add the whiteout entry via f2fs_add_link. If f2fs_add_link fails due to the corrupted directory structure, the function returns an error to VFS, but the partial directory modifications have already been committed to disk. VFS assumes the entire rename operation failed and does not update the dentry cache, leaving stale mappings. In the error path, VFS does not call d_move() to update the dentry cache. This results in new_dentry still pointing to the old inode (new_inode) which has already had its i_nlink decremented to zero. The stale cache causes subsequent operations to incorrectly reference the freed inode. This causes subsequent operations to use cached dentry information that no longer matches the on-disk state. When a second rename targets the same entry, VFS attempts to decrement i_nlink on the stale inode, which may already have i_nlink=0, triggering a WARNING in drop_nlink(). Example sequence: 1. First rename (RENAME_WHITEOUT): file2 → file1 - f2fs updates file1 entry on disk (points to inode 8) - f2fs deletes file2 entry on disk - f2fs_add_link(whiteout) fails (corrupted directory) - Returns error to VFS - VFS does not call d_move() due to error - VFS cache still has: file1 → inode 7 (stale!) - inode 7 has i_nlink=0 (already decremented) 2. Second rename: file3 → file1 - VFS uses stale cache: file1 → inode 7 - Tries to drop_nlink on inode 7 (i_nlink already 0) - WARNING in drop_nlink() Fix this by explicitly invalidating old_dentry and new_dentry when f2fs_add_link fails during whiteout creation. This forces VFS to refresh from disk on subsequent operations, ensuring cache consistency even when the rename partially succeeds. Reproducer: 1. Mount F2FS image with corrupted i_current_depth 2. renameat2(file2, file1, RENAME_WHITEOUT) 3. renameat2(file3, file1, 0) 4. System triggers WARNING in drop_nlink()
来源: 美国国家漏洞数据库 NVD
CVSS Information
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Type
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Title
Linux kernel 安全漏洞
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于目录深度值损坏时,重命名操作失败后未更新dentry缓存,可能导致缓存不一致。
来源: 中国国家信息安全漏洞库 CNNVD
CVSS Information
N/A
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Type
N/A
来源: 中国国家信息安全漏洞库 CNNVD

受影响产品

厂商产品影响版本CPE订阅
LinuxLinux 7e01e7ad746bc8198a8b46163ddc73a1c7d22339 ~ 7f2bae0c881aa1e0a6318756df692cc13df2cc83 -
LinuxLinux 4.2 -

二、漏洞 CVE-2025-71069 的公开POC

#POC 描述源链接神龙链接
AI 生成 POC高级

未找到公开 POC。

登录以生成 AI POC

三、漏洞 CVE-2025-71069 的情报信息

Please 登录 to view more intelligence information

同批安全公告 · Linux · 2026-01-13 · 共 93 条

CVE-2025-710897.8 HIGHLinux kernel 安全漏洞
CVE-2025-71067Linux kernel 安全漏洞
CVE-2025-71066Linux kernel 安全漏洞
CVE-2025-71064Linux kernel 安全漏洞
CVE-2025-68820Linux kernel 安全漏洞
CVE-2025-68819Linux kernel 安全漏洞
CVE-2025-68818Linux kernel 安全漏洞
CVE-2025-68817Linux kernel 安全漏洞
CVE-2025-68816Linux kernel 安全漏洞
CVE-2025-68821Linux kernel 安全漏洞
CVE-2025-71068Linux kernel 安全漏洞
CVE-2025-71071多款产品安全漏洞
CVE-2025-71070Linux kernel 安全漏洞
CVE-2025-71072Linux kernel 安全漏洞
CVE-2025-71073Linux kernel 安全漏洞
CVE-2025-71074Linux kernel 安全漏洞
CVE-2025-71075Linux kernel 安全漏洞
CVE-2025-71077Linux kernel 安全漏洞
CVE-2025-71076Linux kernel 安全漏洞
CVE-2025-71078Linux kernel 安全漏洞

显示前 20 条,共 93 条。 查看全部 → →

IV. Related Vulnerabilities

V. Comments for CVE-2025-71069

暂无评论


发表评论