CVE-2025-71069
BaseFortify
Publication date: 2026-01-13
Last updated on: 2026-01-19
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's F2FS filesystem when it handles rename operations involving whiteouts on directories with corrupted directory depth values. During a RENAME_WHITEOUT operation, partial directory modifications are committed to disk before the system attempts to add a whiteout entry. If adding the whiteout entry fails due to corruption, the system returns an error but does not update the dentry cache, leaving stale cache entries that reference freed inodes. This stale cache causes subsequent operations to incorrectly reference invalid inodes, potentially triggering warnings or errors in the kernel.
How can this vulnerability impact me? :
This vulnerability can cause the filesystem's directory cache to become inconsistent with the on-disk state, leading to stale cache entries that reference freed inodes. This inconsistency can trigger kernel warnings (such as WARNING in drop_nlink()), potentially causing system instability or unexpected behavior during file rename operations on corrupted F2FS filesystems.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring system logs for WARNING messages related to drop_nlink(), which occur when the stale dentry cache causes inode link count inconsistencies. Specifically, look for WARNINGs triggered during rename operations on F2FS filesystems. A reproducer sequence involves mounting an F2FS image with corrupted directory depth and performing renameat2 operations that trigger the issue. Commands to check logs include: `dmesg | grep drop_nlink` or `journalctl -k | grep drop_nlink`. Additionally, monitoring for filesystem corruption or anomalies in rename operations on F2FS may help detect the issue.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include updating the Linux kernel to a version that contains the fix for this vulnerability, which explicitly invalidates the dentry cache on failed whiteout creation to prevent stale cache usage. Until the update is applied, avoid performing RENAME_WHITEOUT operations on F2FS filesystems with corrupted directory depth values, as these trigger the issue. Also, monitor system logs for warnings related to drop_nlink() to detect potential exploitation or occurrence.