In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: Fix an NULL dereference bug The issue here is when this is called from ntfs_load_attr_list(). The "size" comes from le32_to_cpu(attr->res.data_size) so it can't overflow on a 64bit systems but on 32bit systems the "+ 1023" can overflow and the result is zero. This means that the kmalloc will succeed by returning the ZERO_SIZE_PTR and then the memcpy() will crash with an Oops on the next line.
History

Thu, 31 Oct 2024 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published: 2024-04-02T06:22:07.699Z

Updated: 2024-11-04T14:50:04.968Z

Reserved: 2024-03-06T09:52:12.092Z

Link: CVE-2023-52631

cve-icon Vulnrichment

Updated: 2024-08-02T23:03:21.362Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-04-02T07:15:40.900

Modified: 2024-11-21T08:40:14.577

Link: CVE-2023-52631

cve-icon Redhat

Severity : Low

Publid Date: 2024-04-02T00:00:00Z

Links: CVE-2023-52631 - Bugzilla