Home

Description

In the Linux kernel, the following vulnerability has been resolved: fs: ntfs3: fix infinite loop in attr_load_runs_range on inconsistent metadata We found an infinite loop bug in the ntfs3 file system that can lead to a Denial-of-Service (DoS) condition. A malformed NTFS image can cause an infinite loop when an attribute header indicates an empty run list, while directory entries reference it as containing actual data. In NTFS, setting evcn=-1 with svcn=0 is a valid way to represent an empty run list, and run_unpack() correctly handles this by checking if evcn + 1 equals svcn and returning early without parsing any run data. However, this creates a problem when there is metadata inconsistency, where the attribute header claims to be empty (evcn=-1) but the caller expects to read actual data. When run_unpack() immediately returns success upon seeing this condition, it leaves the runs_tree uninitialized with run->runs as a NULL. The calling function attr_load_runs_range() assumes that a successful return means that the runs were loaded and sets clen to 0, expecting the next run_lookup_entry() call to succeed. Because runs_tree remains uninitialized, run_lookup_entry() continues to fail, and the loop increments vcn by zero (vcn += 0), leading to an infinite loop. This patch adds a retry counter to detect when run_lookup_entry() fails consecutively after attr_load_runs_vcn(). If the run is still not found on the second attempt, it indicates corrupted metadata and returns -EINVAL, preventing the Denial-of-Service (DoS) vulnerability.

PUBLISHED Reserved 2026-03-17 | Published 2026-03-18 | Updated 2026-04-13 | Assigner Linux

Product status

Default status
unaffected

be71b5cba2e6485e8959da7a9f9a44461a1bb074 (git) before 6f07a590616ff5f57f7c041d98e463fad9e9f763
affected

be71b5cba2e6485e8959da7a9f9a44461a1bb074 (git) before a89bc96d5abd8a4a8d5d911884ea347efcdf460b
affected

be71b5cba2e6485e8959da7a9f9a44461a1bb074 (git) before af839013c70a24779f9d1afb1575952009312d38
affected

be71b5cba2e6485e8959da7a9f9a44461a1bb074 (git) before 78b61f7eac37a63284774b147f38dd0be6cad43c
affected

be71b5cba2e6485e8959da7a9f9a44461a1bb074 (git) before c0b43c45d45f59e7faad48675a50231a210c379b
affected

be71b5cba2e6485e8959da7a9f9a44461a1bb074 (git) before 3c3a6e951b9b53dab2ac460a655313cf04c4a10a
affected

be71b5cba2e6485e8959da7a9f9a44461a1bb074 (git) before 4b90f16e4bb5607fb35e7802eb67874038da4640
affected

Default status
affected

5.15
affected

Any version before 5.15
unaffected

5.15.202 (semver)
unaffected

6.1.165 (semver)
unaffected

6.6.128 (semver)
unaffected

6.12.75 (semver)
unaffected

6.18.16 (semver)
unaffected

6.19.6 (semver)
unaffected

7.0 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/6f07a590616ff5f57f7c041d98e463fad9e9f763

git.kernel.org/...c/a89bc96d5abd8a4a8d5d911884ea347efcdf460b

git.kernel.org/...c/af839013c70a24779f9d1afb1575952009312d38

git.kernel.org/...c/78b61f7eac37a63284774b147f38dd0be6cad43c

git.kernel.org/...c/c0b43c45d45f59e7faad48675a50231a210c379b

git.kernel.org/...c/3c3a6e951b9b53dab2ac460a655313cf04c4a10a

git.kernel.org/...c/4b90f16e4bb5607fb35e7802eb67874038da4640

cve.org (CVE-2025-71265)

nvd.nist.gov (CVE-2025-71265)

Download JSON