CVE-2025-68728
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
24/12/2025
Última modificación:
19/01/2026
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
ntfs3: fix uninit memory after failed mi_read in mi_format_new<br />
<br />
Fix a KMSAN un-init bug found by syzkaller.<br />
<br />
ntfs_get_bh() expects a buffer from sb_getblk(), that buffer may not be<br />
uptodate. We do not bring the buffer uptodate before setting it as<br />
uptodate. If the buffer were to not be uptodate, it could mean adding a<br />
buffer with un-init data to the mi record. Attempting to load that record<br />
will trigger KMSAN.<br />
<br />
Avoid this by setting the buffer as uptodate, if it’s not already, by<br />
overwriting it.
Impacto
Referencias a soluciones, herramientas e información
- https://git.kernel.org/stable/c/46f2a881e5a7311d41551edb3915e4d4e8802341
- https://git.kernel.org/stable/c/73e6b9dacf72a1e7a4265eacca46f8f33e0997d6
- https://git.kernel.org/stable/c/7ce8f2028dfccb2161b905cf8ab85cdd9e93909c
- https://git.kernel.org/stable/c/81ffe9a265df3e41534726b852ab08792e3d374d
- https://git.kernel.org/stable/c/8bf729b96303bb862d7c6dc05edcf51274ae04cf
- https://git.kernel.org/stable/c/afb144bc8e920db43a23e996eb0a6f9bdea84341
- https://git.kernel.org/stable/c/c70b3abfd530c7f574bc25a5f84707e6fdf0def8



