CVE-2023-52602

In the Linux kernel, the following vulnerability has been resolved: jfs: fix slab-out-of-bounds Read in dtSearch Currently while searching for current page in the sorted entry table of the page there is a out of bound access. Added a bound check to fix the error. Dave: Set return code to -EIO
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

14 Mar 2025, 18:49

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/1b9d6828589d57f94a23fb1c46112cda39d7efdb - () https://git.kernel.org/stable/c/1b9d6828589d57f94a23fb1c46112cda39d7efdb - Patch
References () https://git.kernel.org/stable/c/1c40ca3d39d769931b28295b3145c25f1decf5a6 - () https://git.kernel.org/stable/c/1c40ca3d39d769931b28295b3145c25f1decf5a6 - Patch
References () https://git.kernel.org/stable/c/6c6a96c3d74df185ee344977d46944d6f33bb4dd - () https://git.kernel.org/stable/c/6c6a96c3d74df185ee344977d46944d6f33bb4dd - Patch
References () https://git.kernel.org/stable/c/7110650b85dd2f1cee819acd1345a9013a1a62f7 - () https://git.kernel.org/stable/c/7110650b85dd2f1cee819acd1345a9013a1a62f7 - Patch
References () https://git.kernel.org/stable/c/bff9d4078a232c01e42e9377d005fb2f4d31a472 - () https://git.kernel.org/stable/c/bff9d4078a232c01e42e9377d005fb2f4d31a472 - Patch
References () https://git.kernel.org/stable/c/cab0c265ba182fd266c2aa3c69d7e40640a7f612 - () https://git.kernel.org/stable/c/cab0c265ba182fd266c2aa3c69d7e40640a7f612 - Patch
References () https://git.kernel.org/stable/c/ce8bc22e948634a5c0a3fa58a179177d0e3f3950 - () https://git.kernel.org/stable/c/ce8bc22e948634a5c0a3fa58a179177d0e3f3950 - Patch
References () https://git.kernel.org/stable/c/fa5492ee89463a7590a1449358002ff7ef63529f - () https://git.kernel.org/stable/c/fa5492ee89463a7590a1449358002ff7ef63529f - Patch
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html - Mailing List
References () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html - () https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html - Mailing List
CPE cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Debian debian Linux
Debian
Linux linux Kernel
Linux

Information

Published : 2024-03-06 07:15

Updated : 2025-03-14 18:49


NVD link : CVE-2023-52602

Mitre link : CVE-2023-52602

CVE.ORG link : CVE-2023-52602


JSON object : View

Products Affected

linux

  • linux_kernel

debian

  • debian_linux
CWE
CWE-400

Uncontrolled Resource Consumption