CVE-2025-71067 — Linux vulnerability
14 documents7 sources
Severity
6.4MEDIUM
No vectorEPSS
0.0%
top 92.57%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJan 13
Latest updateApr 17
Description
In the Linux kernel, the following vulnerability has been resolved:
ntfs: set dummy blocksize to read boot_block when mounting
When mounting, sb->s_blocksize is used to read the boot_block without
being defined or validated. Set a dummy blocksize before attempting to
read the boot_block.
The issue can be triggered with the following syz reproducer:
mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0)
r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040), 0x121403, 0x0)
ioctl$F…
Affected Packages14 packages
▶CVEListV5linux/linux28861e3bbd9e7ac4cd9c811aad71b4d116e27930 — 0c9327c8abf9c8f046e45008bb43d94d8ee5c6c5+5
🔴Vulnerability Details
3OSV▶
CVE-2025-71067: In the Linux kernel, the following vulnerability has been resolved: ntfs: set dummy blocksize to read boot_block when mounting When mounting, sb->s_bl↗2026-01-13
GHSA▶
GHSA-wq7w-gfpq-89g4: In the Linux kernel, the following vulnerability has been resolved:
ntfs: set dummy blocksize to read boot_block when mounting
When mounting, sb->s_↗2026-01-13