Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-71265— fs: ntfs3: fix infinite loop in attr_load_runs_range on inconsistent metadata

EPSS 0.04% · P12
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-71265

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
fs: ntfs3: fix infinite loop in attr_load_runs_range on inconsistent metadata
Source: NVD (National Vulnerability Database)
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: fs: ntfs3: fix infinite loop in attr_load_runs_range on inconsistent metadata We found an infinite loop bug in the ntfs3 file system that can lead to a Denial-of-Service (DoS) condition. A malformed NTFS image can cause an infinite loop when an attribute header indicates an empty run list, while directory entries reference it as containing actual data. In NTFS, setting evcn=-1 with svcn=0 is a valid way to represent an empty run list, and run_unpack() correctly handles this by checking if evcn + 1 equals svcn and returning early without parsing any run data. However, this creates a problem when there is metadata inconsistency, where the attribute header claims to be empty (evcn=-1) but the caller expects to read actual data. When run_unpack() immediately returns success upon seeing this condition, it leaves the runs_tree uninitialized with run->runs as a NULL. The calling function attr_load_runs_range() assumes that a successful return means that the runs were loaded and sets clen to 0, expecting the next run_lookup_entry() call to succeed. Because runs_tree remains uninitialized, run_lookup_entry() continues to fail, and the loop increments vcn by zero (vcn += 0), leading to an infinite loop. This patch adds a retry counter to detect when run_lookup_entry() fails consecutively after attr_load_runs_vcn(). If the run is still not found on the second attempt, it indicates corrupted metadata and returns -EINVAL, preventing the Denial-of-Service (DoS) vulnerability.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于元数据不一致时attr_load_runs_range函数存在无限循环,可能导致拒绝服务。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
LinuxLinux be71b5cba2e6485e8959da7a9f9a44461a1bb074 ~ 6f07a590616ff5f57f7c041d98e463fad9e9f763 -
LinuxLinux 5.15 -

II. Public POCs for CVE-2025-71265

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-71265

登录查看更多情报信息。

Same Patch Batch · Linux · 2026-03-18 · 35 CVEs total

CVE-2026-232468.8 HIGHwifi: mac80211: bounds-check link_id in ieee80211_ml_reconfiguration
CVE-2026-232537.8 HIGHmedia: dvb-core: fix wrong reinitialization of ringbuffer on reopen
CVE-2026-232687.8 HIGHapparmor: fix unprivileged local user can do privileged policy management
CVE-2026-232707.8 HIGHnet/sched: Only allow act_ct to bind to clsact/ingress qdiscs and shared blocks
CVE-2026-232487.8 HIGHperf/core: Fix refcount bug and potential UAF in perf_mmap
CVE-2026-232437.8 HIGHRDMA/umad: Reject negative data_len in ib_umad_write
CVE-2026-232457.8 HIGHnet/sched: act_gate: snapshot parameters with RCU on replace
CVE-2026-232427.5 HIGHRDMA/siw: Fix potential NULL pointer dereference in header processing
CVE-2026-232697.1 HIGHapparmor: validate DFA start states are in bounds in unpack_pdb
CVE-2026-23244nvme: fix memory allocation in nvme_pr_read_keys()
CVE-2026-23247tcp: secure_seq: add back ports to TS offset
CVE-2025-71267fs: ntfs3: fix infinite loop triggered by zero-sized ATTR_LIST
CVE-2026-23249xfs: check for deleted cursors when revalidating two btrees
CVE-2026-23250xfs: check return value of xchk_scrub_create_subord
CVE-2026-23251xfs: only call xf{array,blob}_destroy if we have a valid pointer
CVE-2026-23252xfs: get rid of the xchk_xfile_*_descr calls
CVE-2025-71266fs: ntfs3: check return value of indx_find to avoid infinite loop
CVE-2025-71268btrfs: fix reservation leak in some error paths when inserting inline extent
CVE-2025-71269btrfs: do not free data reservation in fallback from inline due to -ENOSPC
CVE-2025-71270LoongArch: Enable exception fixup for specific ADE subcode

Showing top 20 of 35 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2025-71265

No comments yet


Leave a comment