๐Ÿ” CVE Alert

CVE-2025-71267

UNKNOWN 0.0

fs: ntfs3: fix infinite loop triggered by zero-sized ATTR_LIST

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: fs: ntfs3: fix infinite loop triggered by zero-sized ATTR_LIST We found an infinite loop bug in the ntfs3 file system that can lead to a Denial-of-Service (DoS) condition. A malformed NTFS image can cause an infinite loop when an ATTR_LIST attribute indicates a zero data size while the driver allocates memory for it. When ntfs_load_attr_list() processes a resident ATTR_LIST with data_size set to zero, it still allocates memory because of al_aligned(0). This creates an inconsistent state where ni->attr_list.size is zero, but ni->attr_list.le is non-null. This causes ni_enum_attr_ex to incorrectly assume that no attribute list exists and enumerates only the primary MFT record. When it finds ATTR_LIST, the code reloads it and restarts the enumeration, repeating indefinitely. The mount operation never completes, hanging the kernel thread. This patch adds validation to ensure that data_size is non-zero before memory allocation. When a zero-sized ATTR_LIST is detected, the function returns -EINVAL, preventing a DoS vulnerability.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Mar 18, 2026
Last Updated Apr 13, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
be71b5cba2e6485e8959da7a9f9a44461a1bb074 < 9267d99fade76d44d4a133599524031fe684156e be71b5cba2e6485e8959da7a9f9a44461a1bb074 < 976e6a7c51fabf150478decbe8ef5d9a26039b7c be71b5cba2e6485e8959da7a9f9a44461a1bb074 < 8d8c70b57dbeda3eb165c0940b97e85373ca9354 be71b5cba2e6485e8959da7a9f9a44461a1bb074 < 7ef219656febf5ae06ae56b1fce47ebd05f92b68 be71b5cba2e6485e8959da7a9f9a44461a1bb074 < 9779a6eaaabdf47aa57910d352b398ad742e6a5f be71b5cba2e6485e8959da7a9f9a44461a1bb074 < fd508939dbca5eceefb2d0c2564beb15469572f2 be71b5cba2e6485e8959da7a9f9a44461a1bb074 < 06909b2549d631a47fcda249d34be26f7ca1711d
Linux / Linux
5.15

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/9267d99fade76d44d4a133599524031fe684156e git.kernel.org: https://git.kernel.org/stable/c/976e6a7c51fabf150478decbe8ef5d9a26039b7c git.kernel.org: https://git.kernel.org/stable/c/8d8c70b57dbeda3eb165c0940b97e85373ca9354 git.kernel.org: https://git.kernel.org/stable/c/7ef219656febf5ae06ae56b1fce47ebd05f92b68 git.kernel.org: https://git.kernel.org/stable/c/9779a6eaaabdf47aa57910d352b398ad742e6a5f git.kernel.org: https://git.kernel.org/stable/c/fd508939dbca5eceefb2d0c2564beb15469572f2 git.kernel.org: https://git.kernel.org/stable/c/06909b2549d631a47fcda249d34be26f7ca1711d