Home

Description

In the Linux kernel, the following vulnerability has been resolved: dm-verity: disable recursive forward error correction There are two problems with the recursive correction: 1. It may cause denial-of-service. In fec_read_bufs, there is a loop that has 253 iterations. For each iteration, we may call verity_hash_for_block recursively. There is a limit of 4 nested recursions - that means that there may be at most 253^4 (4 billion) iterations. Red Hat QE team actually created an image that pushes dm-verity to this limit - and this image just makes the udev-worker process get stuck in the 'D' state. 2. It doesn't work. In fec_read_bufs we store data into the variable "fio->bufs", but fio bufs is shared between recursive invocations, if "verity_hash_for_block" invoked correction recursively, it would overwrite partially filled fio->bufs.

PUBLISHED Reserved 2026-01-13 | Published 2026-01-23 | Updated 2026-02-09 | Assigner Linux

Product status

Default status
unaffected

a739ff3f543afbb4a041c16cd0182c8e8d366e70 (git) before 232948cf600fba69aff36b25d85ef91a73a35756
affected

a739ff3f543afbb4a041c16cd0182c8e8d366e70 (git) before d9f3e47d3fae0c101d9094bc956ed24e7a0ee801
affected

Default status
affected

4.5
affected

Any version before 4.5
unaffected

6.18.6 (semver)
unaffected

6.19 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/232948cf600fba69aff36b25d85ef91a73a35756

git.kernel.org/...c/d9f3e47d3fae0c101d9094bc956ed24e7a0ee801

cve.org (CVE-2025-71161)

nvd.nist.gov (CVE-2025-71161)

Download JSON