CVE-2025-71067
BaseFortify
Publication date: 2026-01-13
Last updated on: 2026-03-25
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| paragon_software | ntfs | *-* |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's NTFS mounting process. When mounting an NTFS filesystem, the block size used to read the boot block (sb->s_blocksize) is not properly defined or validated and can remain zero. Specifically, if the block size of the block device is larger than the system page size, the block size is not set correctly, leaving sb->s_blocksize at zero. Later, when the kernel tries to read the boot block using this zero block size, it triggers the bug. The fix involves setting a dummy block size before attempting to read the boot block to prevent this issue.
How can this vulnerability impact me? :
The vulnerability can cause improper handling of the NTFS filesystem mount process, potentially leading to kernel errors or crashes when reading the boot block due to an invalid block size. This could result in system instability or denial of service when mounting NTFS filesystems under certain conditions.