Description
In the Linux kernel, the following vulnerability has been resolved:

fs: ntfs3: fix infinite loop in attr_load_runs_range on inconsistent metadata

We found an infinite loop bug in the ntfs3 file system that can lead to a
Denial-of-Service (DoS) condition.

A malformed NTFS image can cause an infinite loop when an attribute header
indicates an empty run list, while directory entries reference it as
containing actual data. In NTFS, setting evcn=-1 with svcn=0 is a valid way
to represent an empty run list, and run_unpack() correctly handles this by
checking if evcn + 1 equals svcn and returning early without parsing any run
data. However, this creates a problem when there is metadata inconsistency,
where the attribute header claims to be empty (evcn=-1) but the caller
expects to read actual data. When run_unpack() immediately returns success
upon seeing this condition, it leaves the runs_tree uninitialized with
run->runs as a NULL. The calling function attr_load_runs_range() assumes
that a successful return means that the runs were loaded and sets clen to 0,
expecting the next run_lookup_entry() call to succeed. Because runs_tree
remains uninitialized, run_lookup_entry() continues to fail, and the loop
increments vcn by zero (vcn += 0), leading to an infinite loop.

This patch adds a retry counter to detect when run_lookup_entry() fails
consecutively after attr_load_runs_vcn(). If the run is still not found on
the second attempt, it indicates corrupted metadata and returns -EINVAL,
preventing the Denial-of-Service (DoS) vulnerability.
Published: 2026-03-18
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability in the Linux kernel’s ntfs3 filesystem causes an infinite loop during attribute run loading when metadata is inconsistent. A malformed NTFS image can trigger the loop, exhausting CPU resources and leading to a denial‑of‑service condition for the affected system. This flaw falls under CWE‑835, reflecting an unchecked infinite loop that results from improper initialization of the runs_tree and lack of input validation. The attacker can craft a corrupted NTFS image that repeatedly triggers the loop until the kernel becomes unresponsive.

Affected Systems

The affected product is the Linux kernel (any version that includes the ntfs3 driver where this bug exists). Exact version details are not provided in the CVE data, so all kernel releases before the patch that handle an empty run list are potentially impacted.

Risk and Exploitability

The vulnerability is exploitable via a specially crafted NTFS image, which could be presented locally or over a network if the image is processed by the system. The EPSS score is below 1%, and the CVSS score of 5.5 indicates moderate severity. The issue is not listed in the CISA KEV catalog. The risk is that an attacker with sufficient access to supply a malicious NTFS image can cause system downtime without requiring elevated privileges. The patch mitigates the issue by detecting consecutive run‑lookup failures and aborting with an error instead of looping indefinitely. Note that this vulnerability aligns with CWE‑835: Infinite Loop.

Generated by OpenCVE AI on May 20, 2026 at 20:53 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Linux kernel update that includes the ntfs3 fix.
  • If immediate patching is not possible, avoid mounting or processing NTFS images from untrusted or unknown sources until the kernel is updated.
  • If the ntfs3 module is not required, consider disabling it or mounting NTFS volumes in read‑only mode to reduce risk of exploitation.

Generated by OpenCVE AI on May 20, 2026 at 20:53 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-4561-1 linux-6.1 security update
Debian DSA Debian DSA DSA-6238-1 linux security update
Debian DSA Debian DSA DSA-6243-1 linux security update
History

Wed, 20 May 2026 19:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-835
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}


Thu, 19 Mar 2026 00:15:00 +0000


Wed, 18 Mar 2026 10:30:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: fs: ntfs3: fix infinite loop in attr_load_runs_range on inconsistent metadata We found an infinite loop bug in the ntfs3 file system that can lead to a Denial-of-Service (DoS) condition. A malformed NTFS image can cause an infinite loop when an attribute header indicates an empty run list, while directory entries reference it as containing actual data. In NTFS, setting evcn=-1 with svcn=0 is a valid way to represent an empty run list, and run_unpack() correctly handles this by checking if evcn + 1 equals svcn and returning early without parsing any run data. However, this creates a problem when there is metadata inconsistency, where the attribute header claims to be empty (evcn=-1) but the caller expects to read actual data. When run_unpack() immediately returns success upon seeing this condition, it leaves the runs_tree uninitialized with run->runs as a NULL. The calling function attr_load_runs_range() assumes that a successful return means that the runs were loaded and sets clen to 0, expecting the next run_lookup_entry() call to succeed. Because runs_tree remains uninitialized, run_lookup_entry() continues to fail, and the loop increments vcn by zero (vcn += 0), leading to an infinite loop. This patch adds a retry counter to detect when run_lookup_entry() fails consecutively after attr_load_runs_vcn(). If the run is still not found on the second attempt, it indicates corrupted metadata and returns -EINVAL, preventing the Denial-of-Service (DoS) vulnerability.
Title fs: ntfs3: fix infinite loop in attr_load_runs_range on inconsistent metadata
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-11T21:57:03.198Z

Reserved: 2026-03-17T09:08:18.457Z

Link: CVE-2025-71265

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2026-03-18T11:16:15.373

Modified: 2026-05-20T19:43:23.257

Link: CVE-2025-71265

cve-icon Redhat

Severity :

Publid Date: 2026-03-18T00:00:00Z

Links: CVE-2025-71265 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-20T21:00:12Z

Weaknesses