๐Ÿ” CVE Alert

CVE-2026-43245

UNKNOWN 0.0

ntfs: ->d_compare() must not block

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: ntfs: ->d_compare() must not block ... so don't use __getname() there. Switch it (and ntfs_d_hash(), while we are at it) to kmalloc(PATH_MAX, GFP_NOWAIT). Yes, ntfs_d_hash() almost certainly can do with smaller allocations, but let ntfs folks deal with that - keep the allocation size as-is for now. Stop abusing names_cachep in ntfs, period - various uses of that thing in there have nothing to do with pathnames; just use k[mz]alloc() and be done with that. For now let's keep sizes as-in, but AFAICS none of the users actually want PATH_MAX.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published May 6, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 142c444a395f4d26055c8a4473e228bb86283f1e 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < fb4b1f969ba01fa1d4088467a02fc1e5f0806710 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < ca2a04e84af79596e5cd9cfe697d5122ec39c8ce
Linux / Linux
All versions affected

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/142c444a395f4d26055c8a4473e228bb86283f1e git.kernel.org: https://git.kernel.org/stable/c/fb4b1f969ba01fa1d4088467a02fc1e5f0806710 git.kernel.org: https://git.kernel.org/stable/c/ca2a04e84af79596e5cd9cfe697d5122ec39c8ce