Impact
The vulnerability in the Linux kernel’s ntfs3 filesystem causes an infinite loop during attribute run loading when metadata is inconsistent. A malformed NTFS image can trigger the loop, exhausting CPU resources and leading to a denial‑of‑service condition for the affected system. The underlying flaw is an improper initialization of the runs_tree combined with unchecked input validation, allowing an attacker to craft a corrupted NTFS image that repeatedly triggers the loop until the kernel becomes unresponsive.
Affected Systems
The affected product is the Linux kernel (any version that includes the ntfs3 driver where this bug exists). Exact version details are not provided in the CVE data, so all kernel releases before the patch that handle an empty run list are potentially impacted.
Risk and Exploitability
The vulnerability is exploitable via a specially crafted NTFS image, which could be presented locally or over a network if the image is processed by the system. While no EPSS score is available, the issue is serious enough to appear in kernel advisories, and it is not listed in the CISA KEV catalog. The risk is that an attacker with sufficient access to supply a malicious NTFS image can cause system downtime without requiring elevated privileges. The patch mitigates the issue by detecting consecutive run‑lookup failures and aborting with an error instead of looping indefinitely.
OpenCVE Enrichment