{"id":"CVE-2025-68728","summary":"ntfs3: fix uninit memory after failed mi_read in mi_format_new","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nntfs3: fix uninit memory after failed mi_read in mi_format_new\n\nFix a KMSAN un-init bug found by syzkaller.\n\nntfs_get_bh() expects a buffer from sb_getblk(), that buffer may not be\nuptodate. We do not bring the buffer uptodate before setting it as\nuptodate. If the buffer were to not be uptodate, it could mean adding a\nbuffer with un-init data to the mi record. Attempting to load that record\nwill trigger KMSAN.\n\nAvoid this by setting the buffer as uptodate, if it’s not already, by\noverwriting it.","modified":"2026-03-31T17:29:34.551162Z","published":"2025-12-24T10:33:11.847Z","related":["SUSE-SU-2026:0447-1","SUSE-SU-2026:0472-1","SUSE-SU-2026:0587-1","SUSE-SU-2026:20477-1","SUSE-SU-2026:20498-1","SUSE-SU-2026:20845-1","SUSE-SU-2026:20876-1","openSUSE-SU-2026:10039-1","openSUSE-SU-2026:10301-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/68xxx/CVE-2025-68728.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/46f2a881e5a7311d41551edb3915e4d4e8802341"},{"type":"WEB","url":"https://git.kernel.org/stable/c/73e6b9dacf72a1e7a4265eacca46f8f33e0997d6"},{"type":"WEB","url":"https://git.kernel.org/stable/c/7ce8f2028dfccb2161b905cf8ab85cdd9e93909c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/81ffe9a265df3e41534726b852ab08792e3d374d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/8bf729b96303bb862d7c6dc05edcf51274ae04cf"},{"type":"WEB","url":"https://git.kernel.org/stable/c/afb144bc8e920db43a23e996eb0a6f9bdea84341"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c70b3abfd530c7f574bc25a5f84707e6fdf0def8"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/68xxx/CVE-2025-68728.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-68728"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"4342306f0f0d5ff4315a204d315c1b51b914fca5"},{"fixed":"afb144bc8e920db43a23e996eb0a6f9bdea84341"},{"fixed":"c70b3abfd530c7f574bc25a5f84707e6fdf0def8"},{"fixed":"8bf729b96303bb862d7c6dc05edcf51274ae04cf"},{"fixed":"7ce8f2028dfccb2161b905cf8ab85cdd9e93909c"},{"fixed":"46f2a881e5a7311d41551edb3915e4d4e8802341"},{"fixed":"81ffe9a265df3e41534726b852ab08792e3d374d"},{"fixed":"73e6b9dacf72a1e7a4265eacca46f8f33e0997d6"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-68728.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"5.15.0"},{"fixed":"5.15.198"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.160"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.6.120"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.7.0"},{"fixed":"6.12.63"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.13.0"},{"fixed":"6.17.13"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.18.0"},{"fixed":"6.18.2"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-68728.json"}}],"schema_version":"1.7.5"}