In the Linux kernel, the following vulnerability has been resolved:

fs/ntfs3: Fix an NULL dereference bug

The issue here is when this is called from ntfs_load_attr_list(). The
"size" comes from le32_to_cpu(attr->res.data_size) so it can't overflow
on a 64bit systems but on 32bit systems the "+ 1023" can overflow and
the result is zero. This means that the kmalloc will succeed by
returning the ZERO_SIZE_PTR and then the memcpy() will crash with an
Oops on the next line.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 08 Apr 2025 19:45:00 +0000

Type Values Removed Values Added
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel

Thu, 31 Oct 2024 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2025-05-04T07:40:20.650Z

Reserved: 2024-03-06T09:52:12.092Z

Link: CVE-2023-52631

cve-icon Vulnrichment

Updated: 2024-08-02T23:03:21.362Z

cve-icon NVD

Status : Analyzed

Published: 2024-04-02T07:15:40.900

Modified: 2025-04-08T19:28:36.347

Link: CVE-2023-52631

cve-icon Redhat

Severity : Low

Publid Date: 2024-04-02T00:00:00Z

Links: CVE-2023-52631 - Bugzilla

cve-icon OpenCVE Enrichment

No data.