CVE-2023-53988
Slab-Out-of-Bounds Read in Linux Kernel NTFS3 Causes Kernel Panic
Publication date: 2025-12-24
Last updated on: 2025-12-24
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the Linux kernel to a version where the fs/ntfs3 slab-out-of-bounds read issue in hdr_delete_de() has been fixed. Avoid using corrupted or malicious NTFS file system images that could trigger the out-of-bounds access and cause kernel panic.
Can you explain this vulnerability to me?
This vulnerability is a slab-out-of-bounds read in the Linux kernel's NTFS3 filesystem driver, specifically in the function hdr_delete_de(). It occurs because the code does not properly validate the index header metadata before using it, which can lead to out-of-bounds memory access when processing a corrupted or malicious NTFS filesystem image. This can cause a kernel panic.
How can this vulnerability impact me? :
This vulnerability can cause a kernel panic, which means the system could crash unexpectedly. This could lead to denial of service or instability on systems using the affected NTFS3 filesystem driver in the Linux kernel, especially if they process corrupted or malicious NTFS filesystem images.