CVE-2023-54196
NULL Pointer Dereference in Linux Kernel NTFS3 Inode Handling
Publication date: 2025-12-30
Last updated on: 2025-12-30
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a NULL pointer dereference in the Linux kernel's NTFS3 filesystem driver, specifically in the 'ni_write_inode' function. It occurs when memory allocation for a new inode record fails, resulting in a NULL pointer that is later dereferenced, causing a kernel crash (NULL pointer dereference). The issue arises because the code does not properly handle the failure of memory allocation before calling 'iput()', leading to the dereference of a NULL pointer.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash or become unstable due to a NULL pointer dereference in the NTFS3 filesystem driver. This can lead to system crashes or denial of service, potentially disrupting normal operations on systems using the affected kernel and filesystem.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is a NULL pointer dereference in the Linux kernel's ntfs3 filesystem code. To mitigate this vulnerability, update the Linux kernel to a version where this issue is fixed. The fix involves ensuring that if new inode allocation fails, the inode is marked bad before calling iput(), preventing the NULL pointer dereference. Until the kernel is updated, avoid using the ntfs3 filesystem or untrusted NTFS volumes that might trigger this issue.