Description
In the Linux kernel, the following vulnerability has been resolved:

hfsplus: ensure sb->s_fs_info is always cleaned up

When hfsplus was converted to the new mount api a bug was introduced by
changing the allocation pattern of sb->s_fs_info. If setup_bdev_super()
fails after a new superblock has been allocated by sget_fc(), but before
hfsplus_fill_super() takes ownership of the filesystem-specific s_fs_info
data it was leaked.

Fix this by freeing sb->s_fs_info in hfsplus_kill_super().
Published: 2026-05-06
Score: n/a
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A flaw in the Linux kernel’s HFS+ filesystem implementation causes an allocation leak when a superblock is allocated but the subsequent initialization fails. The superblock’s filesystem‑specific data structure, sb->s_fs_info, is not freed and remains allocated, resulting in memory that is no longer usable by the system. If this occurs repeatedly, it can lead to a gradual increase in memory consumption and eventually exhaust available memory, rendering the kernel unable to schedule processes and causing a denial of service. This weakness is represented by CWE‑400 and CWE‑404, as it involves an uncontrolled resource consumption and an improper resource release.

Affected Systems

The vulnerability affects the Linux kernel across all vendors that ship their own iterations of the kernel and use the default HFS+ filesystem module. No specific kernel version is listed, so any kernel that has not yet been patched for this issue is potentially impacted.

Risk and Exploitability

While the Exact CVSS score is not provided, the exploitation of this flaw requires successful mounting of an HFS+ filesystem with the new mount API, indicating a local privileged attack vector. The EPSS score is unavailable, and the issue is not listed in the CISA KEV catalog. Nevertheless, the memory‑leak condition can be exploited by repeatable failures of the mount process, which may be triggered by automatically mounting removable media or by a malicious application with sufficient privileges to invoke the mount system call. Once exploited, the victim system can suffer from resource exhaustion leading to degraded performance or shutdowns.

Generated by OpenCVE AI on May 6, 2026 at 13:31 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the kernel to a version that includes the patch that frees sb->s_fs_info during superblock cleanup.
  • Reboot or reload the kernel to ensure the updated driver is in use.
  • If an immediate kernel update is not feasible, restrict the use of the HFS+ mount command to trusted administrators until the patch is applied.

Generated by OpenCVE AI on May 6, 2026 at 13:31 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 06 May 2026 14:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-400
CWE-404

Wed, 06 May 2026 12:15:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: hfsplus: ensure sb->s_fs_info is always cleaned up When hfsplus was converted to the new mount api a bug was introduced by changing the allocation pattern of sb->s_fs_info. If setup_bdev_super() fails after a new superblock has been allocated by sget_fc(), but before hfsplus_fill_super() takes ownership of the filesystem-specific s_fs_info data it was leaked. Fix this by freeing sb->s_fs_info in hfsplus_kill_super().
Title hfsplus: ensure sb->s_fs_info is always cleaned up
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-06T11:27:05.321Z

Reserved: 2026-03-17T09:08:18.458Z

Link: CVE-2025-71271

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-06T12:16:27.090

Modified: 2026-05-06T13:07:51.607

Link: CVE-2025-71271

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-06T13:45:04Z

Weaknesses