CVE-2023-52805

In the Linux kernel, the following vulnerability has been resolved: jfs: fix array-index-out-of-bounds in diAlloc Currently there is not check against the agno of the iag while allocating new inodes to avoid fragmentation problem. Added the check which is required.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

06 Mar 2025, 12:53

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux linux Kernel
Linux
References () https://git.kernel.org/stable/c/05d9ea1ceb62a55af6727a69269a4fd310edf483 - () https://git.kernel.org/stable/c/05d9ea1ceb62a55af6727a69269a4fd310edf483 - Patch
References () https://git.kernel.org/stable/c/1708d0a9917fea579cc9da3d87b154285abd2cd8 - () https://git.kernel.org/stable/c/1708d0a9917fea579cc9da3d87b154285abd2cd8 - Patch
References () https://git.kernel.org/stable/c/1ba7df5457dc1c1071c5f92ac11323533a6430e1 - () https://git.kernel.org/stable/c/1ba7df5457dc1c1071c5f92ac11323533a6430e1 - Patch
References () https://git.kernel.org/stable/c/2308d0fb0dc32446b4e6ca37cd09c30374bb64e9 - () https://git.kernel.org/stable/c/2308d0fb0dc32446b4e6ca37cd09c30374bb64e9 - Patch
References () https://git.kernel.org/stable/c/64f062baf202b82f54987a3f614a6c8f3e466641 - () https://git.kernel.org/stable/c/64f062baf202b82f54987a3f614a6c8f3e466641 - Patch
References () https://git.kernel.org/stable/c/665b44e55c2767a4f899c3b18f49e9e1c9983777 - () https://git.kernel.org/stable/c/665b44e55c2767a4f899c3b18f49e9e1c9983777 - Patch
References () https://git.kernel.org/stable/c/7467ca10a5ff09b0e87edf6c4d2a4bfdee69cf2c - () https://git.kernel.org/stable/c/7467ca10a5ff09b0e87edf6c4d2a4bfdee69cf2c - Patch
References () https://git.kernel.org/stable/c/8c68af2af697ba2ba3b138be0c6d72e2ce3a3d6d - () https://git.kernel.org/stable/c/8c68af2af697ba2ba3b138be0c6d72e2ce3a3d6d - Patch
References () https://git.kernel.org/stable/c/cf7e3e84df36a9953796c737f080712f631d7083 - () https://git.kernel.org/stable/c/cf7e3e84df36a9953796c737f080712f631d7083 - Patch
CWE CWE-129

Information

Published : 2024-05-21 16:15

Updated : 2025-03-06 12:53


NVD link : CVE-2023-52805

Mitre link : CVE-2023-52805

CVE.ORG link : CVE-2023-52805


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-129

Improper Validation of Array Index