Lucene search

K
ubuntucveUbuntu.comUB:CVE-2023-52631
HistoryApr 02, 2024 - 12:00 a.m.

CVE-2023-52631

2024-04-0200:00:00
ubuntu.com
ubuntu.com
10
linux kernel
vulnerability resolved
null dereference bug
fs/ntfs3
32bit systems
kmalloc
memcpy()

AI Score

7.7

Confidence

High

EPSS

0

Percentile

15.5%

In the Linux kernel, the following vulnerability has been resolved:
fs/ntfs3: Fix an NULL dereference bug The issue here is when this is called
from ntfs_load_attr_list(). The “size” comes from
le32_to_cpu(attr->res.data_size) so it can’t overflow on a 64bit systems
but on 32bit systems the “+ 1023” can overflow and the result is zero. This
means that the kmalloc will succeed by returning the ZERO_SIZE_PTR and then
the memcpy() will crash with an Oops on the next line.

OSVersionArchitecturePackageVersionFilename
ubuntu22.04noarchlinux< 5.15.0-106.116UNKNOWN
ubuntu23.10noarchlinux< 6.5.0-44.44UNKNOWN
ubuntu22.04noarchlinux-aws< 5.15.0-1061.67UNKNOWN
ubuntu20.04noarchlinux-aws-5.15< 5.15.0-1061.67~20.04.1UNKNOWN
ubuntu22.04noarchlinux-aws-6.5< 6.5.0-1023.23~22.04.1UNKNOWN
ubuntu22.04noarchlinux-azure< 5.15.0-1063.72UNKNOWN
ubuntu20.04noarchlinux-azure-5.15< 5.15.0-1063.72~20.04.1UNKNOWN
ubuntu22.04noarchlinux-azure-6.5< 6.5.0-1024.25~22.04.1UNKNOWN
ubuntu22.04noarchlinux-azure-fde< 5.15.0-1063.72.1UNKNOWN
ubuntu20.04noarchlinux-azure-fde-5.15< 5.15.0-1063.72~20.04.1.1UNKNOWN
Rows per page:
1-10 of 371

References

AI Score

7.7

Confidence

High

EPSS

0

Percentile

15.5%