CVE-2025-71271
Description
In the Linux kernel, the following vulnerability has been resolved:
hfsplus: ensure sb->s_fs_info is always cleaned up
When hfsplus was converted to the new mount api a bug was introduced by changing the allocation pattern of sb->s_fs_info. If setup_bdev_super() fails after a new superblock has been allocated by sget_fc(), but before hfsplus_fill_super() takes ownership of the filesystem-specific s_fs_info data it was leaked.
Fix this by freeing sb->s_fs_info in hfsplus_kill_super().
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A memory leak in the Linux kernel's HFS+ filesystem (hfsplus) when mounting a device could allow denial of service.
Vulnerability
A memory leak was discovered in the Linux kernel's HFS+ filesystem (hfsplus) during mount operations. When the filesystem was converted to the new mount API, a bug was introduced: if setup_bdev_super() fails after a new superblock is allocated but before hfsplus_fill_super() takes ownership of the filesystem-specific s_fs_info, the allocated memory is not freed, leading to a leak [1].
Exploitation
To exploit this vulnerability, an attacker requires the ability to mount a crafted HFS+ filesystem, typically necessitating local access or the ability to introduce a malicious storage device. The bug is triggered specifically when the mount fails after the superblock allocation, which can be induced by causing setup_bdev_super() to fail. No special privileges beyond mount capability are needed.
Impact
Successful exploitation causes a memory leak, potentially exhausting system memory over repeated mount attempts and leading to system instability or denial of service. There is no evidence of code execution or privilege escalation.
Mitigation
The fix is included in stable kernel updates. The commit referenced in [1] frees sb->s_fs_info in hfsplus_kill_super() to prevent the leak. Users should apply the latest stable kernel updates to mitigate this vulnerability.
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3News mentions
0No linked articles in our index yet.