CVE-2023-54063
Out-of-Bounds Read in Linux Kernel NTFS3 Index Buffer
Publication date: 2025-12-24
Last updated on: 2025-12-24
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an out-of-bounds (OOB) read bug in the Linux kernel's NTFS3 file system driver. It occurs in the function indx_insert_into_buffer when an incorrect value in the INDEX_BUFFER structure causes the code to read memory beyond the intended buffer size. Specifically, if the value used is greater than the total size defined in the INDEX_HDR structure, a memmove operation reads out-of-bounds memory, potentially leading to a kernel crash or other undefined behavior. The issue was fixed by adding a validation check in the hdr_find_e() function.
How can this vulnerability impact me? :
This vulnerability can lead to a kernel crash or instability due to out-of-bounds memory reads in the NTFS3 file system driver. Such behavior can be exploited to cause denial of service or potentially escalate privileges if combined with other vulnerabilities, impacting system reliability and security.