CVE-2025-71265
Received Received - Intake
Infinite Loop DoS in Linux Kernel ntfs3 Filesystem Metadata Handling

Publication date: 2026-03-18

Last updated on: 2026-03-18

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: fs: ntfs3: fix infinite loop in attr_load_runs_range on inconsistent metadata We found an infinite loop bug in the ntfs3 file system that can lead to a Denial-of-Service (DoS) condition. A malformed NTFS image can cause an infinite loop when an attribute header indicates an empty run list, while directory entries reference it as containing actual data. In NTFS, setting evcn=-1 with svcn=0 is a valid way to represent an empty run list, and run_unpack() correctly handles this by checking if evcn + 1 equals svcn and returning early without parsing any run data. However, this creates a problem when there is metadata inconsistency, where the attribute header claims to be empty (evcn=-1) but the caller expects to read actual data. When run_unpack() immediately returns success upon seeing this condition, it leaves the runs_tree uninitialized with run->runs as a NULL. The calling function attr_load_runs_range() assumes that a successful return means that the runs were loaded and sets clen to 0, expecting the next run_lookup_entry() call to succeed. Because runs_tree remains uninitialized, run_lookup_entry() continues to fail, and the loop increments vcn by zero (vcn += 0), leading to an infinite loop. This patch adds a retry counter to detect when run_lookup_entry() fails consecutively after attr_load_runs_vcn(). If the run is still not found on the second attempt, it indicates corrupted metadata and returns -EINVAL, preventing the Denial-of-Service (DoS) vulnerability.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-18
Last Modified
2026-03-18
Generated
2026-05-07
AI Q&A
2026-03-18
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
linux_kernel ntfs3 *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is an infinite loop bug in the Linux kernel's ntfs3 file system. It occurs when there is inconsistent metadata in a malformed NTFS image. Specifically, an attribute header indicates an empty run list, but directory entries reference it as containing actual data. This inconsistency causes the function attr_load_runs_range() to enter an infinite loop because it expects data that is not properly initialized, leading to a Denial-of-Service (DoS) condition.

The root cause is that the run_unpack() function returns success when it encounters an empty run list, leaving the runs_tree uninitialized. The calling function then assumes the runs were loaded and tries to process them, but since the runs_tree is uninitialized, the loop never progresses and runs indefinitely.

The fix involves adding a retry counter to detect when the run_lookup_entry() function fails consecutively. If the run is still not found after a second attempt, the code returns an error indicating corrupted metadata, thus preventing the infinite loop and the resulting Denial-of-Service.


How can this vulnerability impact me? :

This vulnerability can lead to a Denial-of-Service (DoS) condition on systems using the Linux kernel's ntfs3 file system. An attacker could exploit malformed NTFS images with inconsistent metadata to trigger an infinite loop in the kernel, causing the system or affected processes to hang or become unresponsive.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

I don't know


What immediate steps should I take to mitigate this vulnerability?

I don't know


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart