CVE-2025-71067
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
13/01/2026
Last modified:
15/04/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
ntfs: set dummy blocksize to read boot_block when mounting<br />
<br />
When mounting, sb->s_blocksize is used to read the boot_block without<br />
being defined or validated. Set a dummy blocksize before attempting to<br />
read the boot_block.<br />
<br />
The issue can be triggered with the following syz reproducer:<br />
<br />
mkdirat(0xffffffffffffff9c, &(0x7f0000000080)=&#39;./file1\x00&#39;, 0x0)<br />
r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040), 0x121403, 0x0)<br />
ioctl$FS_IOC_SETFLAGS(r4, 0x40081271, &(0x7f0000000980)=0x4000)<br />
mount(&(0x7f0000000140)=@nullb, &(0x7f0000000040)=&#39;./cgroup\x00&#39;,<br />
&(0x7f0000000000)=&#39;ntfs3\x00&#39;, 0x2208004, 0x0)<br />
syz_clone(0x88200200, 0x0, 0x0, 0x0, 0x0, 0x0)<br />
<br />
Here, the ioctl sets the bdev block size to 16384. During mount,<br />
get_tree_bdev_flags() calls sb_set_blocksize(sb, block_size(bdev)),<br />
but since block_size(bdev) > PAGE_SIZE, sb_set_blocksize() leaves<br />
sb->s_blocksize at zero.<br />
<br />
Later, ntfs_init_from_boot() attempts to read the boot_block while<br />
sb->s_blocksize is still zero, which triggers the bug.<br />
<br />
[almaz.alexandrovich@paragon-software.com: changed comment style, added<br />
return value handling]
Impact
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/0c9327c8abf9c8f046e45008bb43d94d8ee5c6c5
- https://git.kernel.org/stable/c/44a38eb4f7876513db5a1bccde74de9bc4389d43
- https://git.kernel.org/stable/c/4fff9a625da958a33191c8553a03283786f9f417
- https://git.kernel.org/stable/c/b3c151fe8f543f1a0b8b5df16ce5d97afa5ec85a
- https://git.kernel.org/stable/c/d1693a7d5a38acf6424235a6070bcf5b186a360d



