CVE-2025-71271 PUBLISHED

hfsplus: ensure sb->s_fs_info is always cleaned up

Assigner: Linux
Reserved: 17.03.2026 Published: 06.05.2026 Updated: 06.05.2026

In the Linux kernel, the following vulnerability has been resolved:

hfsplus: ensure sb->s_fs_info is always cleaned up

When hfsplus was converted to the new mount api a bug was introduced by changing the allocation pattern of sb->s_fs_info. If setup_bdev_super() fails after a new superblock has been allocated by sget_fc(), but before hfsplus_fill_super() takes ownership of the filesystem-specific s_fs_info data it was leaked.

Fix this by freeing sb->s_fs_info in hfsplus_kill_super().

Product Status

Vendor Linux
Product Linux
Versions Default: unaffected
  • affected from 432f7c78cb000a3151fa0d39585b000312f50d7e to 0bcfebb83b5460d5be4e5c9dfb19cdaf3d4cb1db (excl.)
  • affected from 432f7c78cb000a3151fa0d39585b000312f50d7e to 1e38d32bb04d85a2c81204a85a34878a497128c8 (excl.)
  • affected from 432f7c78cb000a3151fa0d39585b000312f50d7e to 126fb0ce99431126b44a6c360192668c818f641f (excl.)
Vendor Linux
Product Linux
Versions Default: affected
  • Version 6.13 is affected
  • unaffected from 0 to 6.13 (excl.)
  • unaffected from 6.18.16 to 6.18.* (incl.)
  • unaffected from 6.19.6 to 6.19.* (incl.)
  • unaffected from 7.0 to * (incl.)

References