PT-2026-26043 · Linux · Linux
Published
2026-03-18
·
Updated
2026-03-18
·
CVE-2025-71266
None
No severity ratings or metrics are available. When they are, we'll update the corresponding info on the page.
In the Linux kernel, the following vulnerability has been resolved:
fs: ntfs3: check return value of indx find to avoid infinite loop
We found an infinite loop bug in the ntfs3 file system that can lead to a
Denial-of-Service (DoS) condition.
A malformed dentry in the ntfs3 filesystem can cause the kernel to hang
during the lookup operations. By setting the HAS SUB NODE flag in an
INDEX ENTRY within a directory's INDEX ALLOCATION block and manipulating the
VCN pointer, an attacker can cause the indx find() function to repeatedly
read the same block, allocating 4 KB of memory each time. The kernel lacks
VCN loop detection and depth limits, causing memory exhaustion and an OOM
crash.
This patch adds a return value check for fnd push() to prevent a memory
exhaustion vulnerability caused by infinite loops. When the index exceeds the
size of the fnd->nodes array, fnd push() returns -EINVAL. The indx find()
function checks this return value and stops processing, preventing further
memory allocation.
Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
Affected Products
Linux