CVE-2025-71237
BaseFortify
Publication date: 2026-02-18
Last updated on: 2026-03-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 6.19 (inc) to 6.19.1 (exc) |
| linux | linux_kernel | From 5.16 (inc) to 6.1.164 (exc) |
| linux | linux_kernel | From 5.11 (inc) to 5.15.201 (exc) |
| linux | linux_kernel | From 6.2 (inc) to 6.6.125 (exc) |
| linux | linux_kernel | From 6.7 (inc) to 6.12.72 (exc) |
| linux | linux_kernel | From 6.13 (inc) to 6.18.11 (exc) |
| linux | linux_kernel | From 3.15 (inc) to 5.10.251 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's nilfs2 filesystem when processing the FITRIM command. An underflow occurs during the calculation of the number of blocks (nblocks) if the end_block value is too small. Because nblocks is an unsigned 64-bit integer, a negative calculation results in a very large positive number. This causes the block layer function __blkdev_issue_discard() to take an excessively long time processing the discard request, holding a lock (ns_segctor_sem) for a prolonged period.
As a result, other tasks cannot acquire this lock, leading to a system hang. The issue typically arises when the ending block is smaller than about 4KiB, potentially causing discard requests beyond the device size. The fix involves safely ignoring such small ranges by treating them as no-ops, avoiding trimming or errors.
How can this vulnerability impact me? :
This vulnerability can cause the affected Linux system to hang or become unresponsive when the FITRIM command is executed with certain parameters. The system hang occurs because a lock remains held for an extended time, blocking other tasks from proceeding.
Such a hang can disrupt normal operations, potentially leading to downtime or degraded system performance until the issue is resolved or the system is restarted.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
I don't know