CVE-2023-53328
BaseFortify
Publication date: 2025-09-16
Last updated on: 2025-12-10
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15 (inc) to 5.15.128 (exc) |
| linux | linux_kernel | From 5.16 (inc) to 6.1.47 (exc) |
| linux | linux_kernel | From 6.2 (inc) to 6.4.12 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-476 | The product dereferences a pointer that it expects to be valid but is NULL. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is in the Linux kernel's NTFS3 file system driver. It involves insufficient error handling in the function ni_create_attr_list, which generates an attribute list. Previously, the code used WARN_ON to catch errors, which only printed a stack trace but did not properly handle the error. This could lead to a kernel NULL pointer dereference and a crash (kernel oops). The vulnerability has been resolved by enhancing the sanity checks and replacing WARN_ON with more proper error handling.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash due to a NULL pointer dereference when handling NTFS file system attributes. This can lead to system instability or denial of service if exploited, potentially affecting availability of the system or data access.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring kernel logs for specific error messages related to the ntfs3 filesystem, such as kernel NULL pointer dereference or WARN_ON triggers in ni_create_attr_list. You can check the kernel log using the command: dmesg | grep -i ntfs3 or dmesg | grep -i 'NULL pointer dereference'. Additionally, monitoring for Oops or BUG messages in the kernel logs may indicate this issue.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include updating the Linux kernel to a version where this vulnerability has been fixed, as the issue involves improved error handling in the ntfs3 filesystem code. Until an update is applied, avoid using the ntfs3 filesystem for critical operations to reduce the risk of triggering the vulnerability.