Impact
The vulnerability in the Linux kernel’s ntfs3 filesystem causes an infinite loop during attribute run loading when metadata is inconsistent. A malformed NTFS image can trigger the loop, exhausting CPU resources and leading to a denial‑of‑service condition for the affected system. This flaw falls under CWE‑835, reflecting an unchecked infinite loop that results from improper initialization of the runs_tree and lack of input validation. The attacker can craft a corrupted NTFS image that repeatedly triggers the loop until the kernel becomes unresponsive.
Affected Systems
The affected product is the Linux kernel (any version that includes the ntfs3 driver where this bug exists). Exact version details are not provided in the CVE data, so all kernel releases before the patch that handle an empty run list are potentially impacted.
Risk and Exploitability
The vulnerability is exploitable via a specially crafted NTFS image, which could be presented locally or over a network if the image is processed by the system. The EPSS score is below 1%, and the CVSS score of 5.5 indicates moderate severity. The issue is not listed in the CISA KEV catalog. The risk is that an attacker with sufficient access to supply a malicious NTFS image can cause system downtime without requiring elevated privileges. The patch mitigates the issue by detecting consecutive run‑lookup failures and aborting with an error instead of looping indefinitely. Note that this vulnerability aligns with CWE‑835: Infinite Loop.
OpenCVE Enrichment
Debian DLA
Debian DSA