Description
In the Linux kernel, the following vulnerability has been resolved:

ntfs3: fix circular locking dependency in run_unpack_ex

Syzbot reported a circular locking dependency between wnd->rw_lock
(sbi->used.bitmap) and ni->file.run_lock.

The deadlock scenario:
1. ntfs_extend_mft() takes ni->file.run_lock then wnd->rw_lock.
2. run_unpack_ex() takes wnd->rw_lock then tries to acquire
ni->file.run_lock inside ntfs_refresh_zone().

This creates an AB-BA deadlock.

Fix this by using down_read_trylock() instead of down_read() when
acquiring run_lock in run_unpack_ex(). If the lock is contended,
skip ntfs_refresh_zone() - the MFT zone will be refreshed on the
next MFT operation. This breaks the circular dependency since we
never block waiting for run_lock while holding wnd->rw_lock.
Published: 2026-05-06
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability resides in the Linux kernel's NTFS3 driver. A circular lock dependency exists between the MFT zone read lock and the file run lock. If a user triggers file extensions while the NTFS driver is refreshing zones, the driver may acquire these locks in opposite order, leading to an AB‑BA deadlock. The result is a kernel stall or system hang, effectively denying service for the affected system. The weakness is a classic lock‑deadlock scenario.

Affected Systems

The issue is present in generic Linux kernel versions that contain the NTFS3 code paths described above, before the patch that replaces the blocking lock acquisition with a try‑lock. No specific distribution or kernel release is listed, so any Linux distribution using an older kernel that does not include the latest NTFS3 changes is potentially affected.

Risk and Exploitability

The attack vector is local; any user capable of performing NTFS operations on the system can trigger the deadlock by extending the MFT. While there is no documented remote exploitation path, a local attacker who can generate heavy NTFS traffic could bring the system to a halt. The EPSS value is not available and the vulnerability is not listed in CISA's KEV catalog, suggesting limited public exploitation. However, the severity can be high (functionally equivalent to a denial of service). The main risk is that a prolonged deadlock can lock out users and services until a reboot or kernel recovery is performed.

Generated by OpenCVE AI on May 7, 2026 at 04:29 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Linux kernel to a version that incorporates the NTFS3 lock fix (e.g., apply upstream kernel updates containing commit 08ce2fee1b869ecbfbd94e0eb2630e52203a2e03).
  • If an immediate kernel upgrade is not possible, disable or avoid using NTFS partitions until the fix is applied, or mount them read‑only to reduce the chance of trigger events.
  • If delays persist, compile and replace the kernel's ntfs3 module with a patched version containing the commit, and load it manually to mitigate until a full kernel upgrade is available.

Generated by OpenCVE AI on May 7, 2026 at 04:29 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 07 May 2026 03:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-892

Thu, 07 May 2026 00:15:00 +0000


Wed, 06 May 2026 14:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-892

Wed, 06 May 2026 12:15:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: ntfs3: fix circular locking dependency in run_unpack_ex Syzbot reported a circular locking dependency between wnd->rw_lock (sbi->used.bitmap) and ni->file.run_lock. The deadlock scenario: 1. ntfs_extend_mft() takes ni->file.run_lock then wnd->rw_lock. 2. run_unpack_ex() takes wnd->rw_lock then tries to acquire ni->file.run_lock inside ntfs_refresh_zone(). This creates an AB-BA deadlock. Fix this by using down_read_trylock() instead of down_read() when acquiring run_lock in run_unpack_ex(). If the lock is contended, skip ntfs_refresh_zone() - the MFT zone will be refreshed on the next MFT operation. This breaks the circular dependency since we never block waiting for run_lock while holding wnd->rw_lock.
Title ntfs3: fix circular locking dependency in run_unpack_ex
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-07T17:14:20.303Z

Reserved: 2026-05-01T14:12:55.988Z

Link: CVE-2026-43127

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-06T12:16:29.727

Modified: 2026-05-06T13:07:51.607

Link: CVE-2026-43127

cve-icon Redhat

Severity :

Publid Date: 2026-05-06T00:00:00Z

Links: CVE-2026-43127 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-07T04:30:21Z

Weaknesses