U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2025-71292 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: jfs: nlink overflow in jfs_rename If nlink is maximal for a directory (-1) and inside that directory you perform a rename for some child directory (not moving from the parent), then the nlink of the first directory is first incremented and later decremented. Normally this is fine, but when nlink = -1 this causes a wrap around to 0, and then drop_nlink issues a warning. After applying the patch syzbot no longer issues any warnings. I also ran some basic fs tests to look for any regressions.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].

URL Source(s) Tag(s)
https://git.kernel.org/stable/c/2108829a59f081e822fdab8c2cd7131deb8aa8a1 kernel.org
https://git.kernel.org/stable/c/5d77c36cd4b698649f5c30c5f6c084f4f61d1880 kernel.org
https://git.kernel.org/stable/c/9218dc26fd922b09858ecd3666ed57dfd8098da8 kernel.org
https://git.kernel.org/stable/c/93c325746ae59709b4f9bad4e3e4761c8d566c70 kernel.org
https://git.kernel.org/stable/c/a3d66089e50a6e0142f8884471f74292102ea9aa kernel.org
https://git.kernel.org/stable/c/b4330a0d0947fbdc9d445cbbeabd8cc910a8c9ca kernel.org
https://git.kernel.org/stable/c/f70fcbc2ac7c24f087a2c895c5753aa730b1e479 kernel.org
https://git.kernel.org/stable/c/fe136426e30ca6debcf916fd6a141555ed9fde74 kernel.org

Weakness Enumeration

CWE-ID CWE Name Source

Change History

1 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2025-71292
NVD Published Date:
05/06/2026
NVD Last Modified:
05/06/2026
Source:
kernel.org