CVE-2025-71237

Source
https://cve.org/CVERecord?id=CVE-2025-71237
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-71237.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-71237
Downstream
Related
Published
2026-02-18T14:53:22.436Z
Modified
2026-03-20T12:46:40.541277Z
Summary
nilfs2: Fix potential block overflow that cause system hang
Details

In the Linux kernel, the following vulnerability has been resolved:

nilfs2: Fix potential block overflow that cause system hang

When a user executes the FITRIM command, an underflow can occur when calculating nblocks if endblock is too small. Since nblocks is of type sectort, which is u64, a negative nblocks value will become a very large positive integer. This ultimately leads to the block layer function __blkdevissuediscard() taking an excessively long time to process the bio chain, and the nssegctorsem lock remains held for a long period. This prevents other tasks from acquiring the nssegctorsem lock, resulting in the hang reported by syzbot in [1].

If the ending block is too small, typically if it is smaller than 4KiB range, depending on the usage of the segment 0, it may be possible to attempt a discard request beyond the device size causing the hang.

Exiting successfully and assign the discarded size (0 in this case) to range->len.

Although the start and len values in the user input range are too small, a conservative strategy is adopted here to safely ignore them, which is equivalent to a no-op; it will not perform any trimming and will not throw an error.

[1] task:segctord state:D stack:28968 pid:6093 tgid:6093 ppid:2 taskflags:0x200040 flags:0x00080000 Call Trace: rwbasewritelock+0x3dd/0x750 kernel/locking/rwbasert.c:272 nilfstransactionlock+0x253/0x4c0 fs/nilfs2/segment.c:357 nilfssegctorthreadconstruct fs/nilfs2/segment.c:2569 [inline] nilfssegctor_thread+0x6ec/0xe00 fs/nilfs2/segment.c:2684

[ryusuke: corrected part of the commit message about the consequences]

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/71xxx/CVE-2025-71237.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
82e11e857be3ffd2a0a952c9db8aa2379e2b9e44
Fixed
6457d3ee41a4c15082ac49c5aa7fb933b4a043f3
Fixed
ba18e5f22f26aa4ef78bc3e81f639d1d4f3845e6
Fixed
2438982f635e6cc2009be68ba2efb2998727d8d4
Fixed
df1e20796c9f3d541cca47fb72e4369ea135642d
Fixed
ea2278657ad0d62596589fbe2caf995e189e65e7
Fixed
4aa45f841413cca81882602b4042c53502f34cad
Fixed
b8c5ee234bd54f1447c846101fdaef2cf70c2149
Fixed
ed527ef0c264e4bed6c7b2a158ddf516b17f5f66

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-71237.json"