Skip to content

In the Linux kernel, the following vulnerability has been...

Unreviewed Published Apr 2, 2024 to the GitHub Advisory Database • Updated Apr 2, 2024

Package

No package listedSuggest a package

Affected versions

Unknown

Patched versions

Unknown

Description

In the Linux kernel, the following vulnerability has been resolved:

fs/ntfs3: Fix an NULL dereference bug

The issue here is when this is called from ntfs_load_attr_list(). The
"size" comes from le32_to_cpu(attr->res.data_size) so it can't overflow
on a 64bit systems but on 32bit systems the "+ 1023" can overflow and
the result is zero. This means that the kmalloc will succeed by
returning the ZERO_SIZE_PTR and then the memcpy() will crash with an
Oops on the next line.

References

Published by the National Vulnerability Database Apr 2, 2024
Published to the GitHub Advisory Database Apr 2, 2024
Last updated Apr 2, 2024

Severity

Unknown

EPSS score

0.045%
(16th percentile)

Weaknesses

No CWEs

CVE ID

CVE-2023-52631

GHSA ID

GHSA-pwxx-fx4j-ffv3

Source code

No known source code

Dependabot alerts are not supported on this advisory because it does not have a package from a supported ecosystem with an affected and fixed version.

Learn more about GitHub language support

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.