CVE-2023-54077
Memory Leak in Linux Kernel ntfs3 Driver Fixed
Publication date: 2025-12-24
Last updated on: 2025-12-24
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is fixed by updating the Linux kernel to a version where the ntfs3 driver properly sets is_root and NI_FLAG_DIR together, preventing the memory leak. Therefore, the immediate step is to update your Linux kernel to the patched version that includes this fix.
Can you explain this vulnerability to me?
This vulnerability is a memory leak in the Linux kernel's NTFS3 file system driver. It occurs because two related states, is_root and NI_FLAG_DIR, are not always set consistently when reading the Master File Table (MFT). Specifically, if the attribute name in the ATTR_ROOT label sets is_root to true but does not set NI_FLAG_DIR, subsequent code allocates memory for ni->dir.alloc_run but does not properly free it later, causing a memory leak. The fix ensures that is_root and NI_FLAG_DIR are always set together to prevent this leak.
How can this vulnerability impact me? :
This vulnerability can lead to a memory leak in the Linux kernel when handling NTFS file systems. Over time, this leak could consume system memory unnecessarily, potentially degrading system performance or causing instability, especially on systems that frequently access NTFS volumes.