CVE-2023-52805

In the Linux kernel, the following vulnerability has been resolved: jfs: fix array-index-out-of-bounds in diAlloc Currently there is not check against the agno of the iag while allocating new inodes to avoid fragmentation problem. Added the check which is required.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

06 Mar 2025, 12:53

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux linux Kernel
Linux
CWE CWE-129
References () https://git.kernel.org/stable/c/05d9ea1ceb62a55af6727a69269a4fd310edf483 - () https://git.kernel.org/stable/c/05d9ea1ceb62a55af6727a69269a4fd310edf483 - Patch
References () https://git.kernel.org/stable/c/1708d0a9917fea579cc9da3d87b154285abd2cd8 - () https://git.kernel.org/stable/c/1708d0a9917fea579cc9da3d87b154285abd2cd8 - Patch
References () https://git.kernel.org/stable/c/1ba7df5457dc1c1071c5f92ac11323533a6430e1 - () https://git.kernel.org/stable/c/1ba7df5457dc1c1071c5f92ac11323533a6430e1 - Patch
References () https://git.kernel.org/stable/c/2308d0fb0dc32446b4e6ca37cd09c30374bb64e9 - () https://git.kernel.org/stable/c/2308d0fb0dc32446b4e6ca37cd09c30374bb64e9 - Patch
References () https://git.kernel.org/stable/c/64f062baf202b82f54987a3f614a6c8f3e466641 - () https://git.kernel.org/stable/c/64f062baf202b82f54987a3f614a6c8f3e466641 - Patch
References () https://git.kernel.org/stable/c/665b44e55c2767a4f899c3b18f49e9e1c9983777 - () https://git.kernel.org/stable/c/665b44e55c2767a4f899c3b18f49e9e1c9983777 - Patch
References () https://git.kernel.org/stable/c/7467ca10a5ff09b0e87edf6c4d2a4bfdee69cf2c - () https://git.kernel.org/stable/c/7467ca10a5ff09b0e87edf6c4d2a4bfdee69cf2c - Patch
References () https://git.kernel.org/stable/c/8c68af2af697ba2ba3b138be0c6d72e2ce3a3d6d - () https://git.kernel.org/stable/c/8c68af2af697ba2ba3b138be0c6d72e2ce3a3d6d - Patch
References () https://git.kernel.org/stable/c/cf7e3e84df36a9953796c737f080712f631d7083 - () https://git.kernel.org/stable/c/cf7e3e84df36a9953796c737f080712f631d7083 - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8

21 Nov 2024, 08:40

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/05d9ea1ceb62a55af6727a69269a4fd310edf483 - () https://git.kernel.org/stable/c/05d9ea1ceb62a55af6727a69269a4fd310edf483 -
References () https://git.kernel.org/stable/c/1708d0a9917fea579cc9da3d87b154285abd2cd8 - () https://git.kernel.org/stable/c/1708d0a9917fea579cc9da3d87b154285abd2cd8 -
References () https://git.kernel.org/stable/c/1ba7df5457dc1c1071c5f92ac11323533a6430e1 - () https://git.kernel.org/stable/c/1ba7df5457dc1c1071c5f92ac11323533a6430e1 -
References () https://git.kernel.org/stable/c/2308d0fb0dc32446b4e6ca37cd09c30374bb64e9 - () https://git.kernel.org/stable/c/2308d0fb0dc32446b4e6ca37cd09c30374bb64e9 -
References () https://git.kernel.org/stable/c/64f062baf202b82f54987a3f614a6c8f3e466641 - () https://git.kernel.org/stable/c/64f062baf202b82f54987a3f614a6c8f3e466641 -
References () https://git.kernel.org/stable/c/665b44e55c2767a4f899c3b18f49e9e1c9983777 - () https://git.kernel.org/stable/c/665b44e55c2767a4f899c3b18f49e9e1c9983777 -
References () https://git.kernel.org/stable/c/7467ca10a5ff09b0e87edf6c4d2a4bfdee69cf2c - () https://git.kernel.org/stable/c/7467ca10a5ff09b0e87edf6c4d2a4bfdee69cf2c -
References () https://git.kernel.org/stable/c/8c68af2af697ba2ba3b138be0c6d72e2ce3a3d6d - () https://git.kernel.org/stable/c/8c68af2af697ba2ba3b138be0c6d72e2ce3a3d6d -
References () https://git.kernel.org/stable/c/cf7e3e84df36a9953796c737f080712f631d7083 - () https://git.kernel.org/stable/c/cf7e3e84df36a9953796c737f080712f631d7083 -
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: jfs: corrige el índice de matriz fuera de los límites en diAlloc. Actualmente no se verifica el agno del iag al asignar nuevos inodos para evitar problemas de fragmentación. Se agregó la comprobación que se requiere.

21 May 2024, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-21 16:15

Updated : 2025-03-06 12:53


NVD link : CVE-2023-52805

Mitre link : CVE-2023-52805

CVE.ORG link : CVE-2023-52805


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-129

Improper Validation of Array Index