In the Linux kernel, the following vulnerability has been resolved: ntfs: check overflow when iterating ATTR_RECORDs Kernel iterates over ATTR_RECORDs in mft record in ntfs_attr_find(). Because the ATTR_RECORDs are next to each other, kernel can get the next ATTR_RECORD from end address of current ATTR_RECORD, through current ATTR_RECORD length field. The problem is that during iteration, when kernel calculates the end address of current ATTR_RECORD, kernel may trigger an integer overflow bug in executing `a = (ATTR_RECORD*)((u8*)a + le32_to_cpu(a->length))`. This may wrap, leading to a forever iteration on 32bit systems. This patch solves it by adding some checks on calculating end address of current ATTR_RECORD during iteration.
2025-05-01T15:15:58.933
2025-11-06T21:59:25.140
Analyzed
416baaa9-dc9f-4396-8d5f-8c081fb06d67
CVSSv3.1: 5.5 (MEDIUM)
| Type | Vendor | Product | Version/Range | Vulnerable? |
|---|---|---|---|---|
| Operating System | linux | linux_kernel | < 4.9.334 | Yes |
| Operating System | linux | linux_kernel | < 4.14.300 | Yes |
| Operating System | linux | linux_kernel | < 4.19.267 | Yes |
| Operating System | linux | linux_kernel | < 5.4.225 | Yes |
| Operating System | linux | linux_kernel | < 5.10.156 | Yes |
| Operating System | linux | linux_kernel | < 5.15.80 | Yes |
| Operating System | linux | linux_kernel | < 6.0.10 | Yes |