Description
In the Linux kernel, the following vulnerability has been resolved:

fs/ntfs3: handle attr_set_size() errors when truncating files

If attr_set_size() fails while truncating down, the error is silently
ignored and the inode may be left in an inconsistent state.
Published: 2026-05-06
Score: n/a
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

This vulnerability affects the NTFS3 driver in the Linux kernel. When the attr_set_size() function fails while truncating a file, the error is ignored silently. As a result, the inode metadata can become inconsistent, potentially leading to corrupted file contents, loss of data, or a denial of service if file system integrity is compromised. The weakness is a failure to appropriately handle an error condition, allowing state corruption. Based on the description, the impact is limited to local systems that have the affected kernel using NTFS3 devices; there is no evidence of a remote execution vector.

Affected Systems

All versions of the Linux kernel that contain the NTFS3 file system implementation before the patch identified by commit 576248a34b9 are affected. The vulnerability is present on any host that mounts NTFS3 file systems, whether on internal storage or removable media, without being updated to a kernel version that includes the fix.

Risk and Exploitability

The CVSS score is not provided, and EPSS information is unavailable, so quantitative metrics are unknown. The vulnerability is listed as not in the CISA KEV catalog. The lowest‑labeled exploit vector present in the description is a local file truncation operation, implying that a local attacker with write privileges on an NTFS3 mount can trigger the condition. Because the error is silently ignored, an attacker could cause data corruption or, at worst, induce a system crash if the inode inconsistency propagates. While exploitation does not appear to enable privilege escalation directly, the resulting data integrity loss presents a medium to high risk for affected systems.

Generated by OpenCVE AI on May 6, 2026 at 13:56 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Linux kernel to a release that includes the NTFS3 patch commit 576248a34b9.
  • If an immediate kernel update is not possible, remount NTFS3 volumes as read‑only or otherwise prevent file truncation operations until the patch is applied.
  • After applying the patch, run a filesystem consistency check (e.g., ntfsfix or fsck.ntfs) on NTFS3 volumes to detect and repair any inode inconsistencies.

Generated by OpenCVE AI on May 6, 2026 at 13:56 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 06 May 2026 14:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-390

Wed, 06 May 2026 12:15:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: handle attr_set_size() errors when truncating files If attr_set_size() fails while truncating down, the error is silently ignored and the inode may be left in an inconsistent state.
Title fs/ntfs3: handle attr_set_size() errors when truncating files
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-06T11:32:21.715Z

Reserved: 2026-05-06T11:31:45.509Z

Link: CVE-2025-71289

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-06T12:16:28.103

Modified: 2026-05-06T13:07:51.607

Link: CVE-2025-71289

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-06T14:00:06Z

Weaknesses