CVE-2023-52631

Source
https://cve.org/CVERecord?id=CVE-2023-52631
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52631.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-52631
Downstream
Related
Published
2024-04-02T06:22:07.699Z
Modified
2026-03-20T12:32:40.111032Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
fs/ntfs3: Fix an NULL dereference bug
Details

In the Linux kernel, the following vulnerability has been resolved:

fs/ntfs3: Fix an NULL dereference bug

The issue here is when this is called from ntfsloadattrlist(). The "size" comes from le32tocpu(attr->res.datasize) so it can't overflow on a 64bit systems but on 32bit systems the "+ 1023" can overflow and the result is zero. This means that the kmalloc will succeed by returning the ZEROSIZEPTR and then the memcpy() will crash with an Oops on the next line.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52631.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
be71b5cba2e6485e8959da7a9f9a44461a1bb074
Fixed
ae4acad41b0f93f1c26cc0fc9135bb79d8282d0b
Fixed
ec1bedd797588fe38fc11cba26d77bb1d9b194c6
Fixed
fb7bcd1722bc9bc55160378f5f99c01198fd14a7
Fixed
686820fe141ea0220fc6fdfc7e5694f915cf64b2
Fixed
b2dd7b953c25ffd5912dda17e980e7168bebcf6c

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52631.json"