Lucene search

K
nvd416baaa9-dc9f-4396-8d5f-8c081fb06d67NVD:CVE-2023-52631
HistoryApr 02, 2024 - 7:15 a.m.

CVE-2023-52631

2024-04-0207:15:40
416baaa9-dc9f-4396-8d5f-8c081fb06d67
web.nvd.nist.gov
7
linux kernel
ntfs3
null dereference

AI Score

7.6

Confidence

High

EPSS

0

Percentile

15.5%

In the Linux kernel, the following vulnerability has been resolved:

fs/ntfs3: Fix an NULL dereference bug

The issue here is when this is called from ntfs_load_attr_list(). The
“size” comes from le32_to_cpu(attr->res.data_size) so it can’t overflow
on a 64bit systems but on 32bit systems the “+ 1023” can overflow and
the result is zero. This means that the kmalloc will succeed by
returning the ZERO_SIZE_PTR and then the memcpy() will crash with an
Oops on the next line.

AI Score

7.6

Confidence

High

EPSS

0

Percentile

15.5%