U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

NOTICE UPDATED - May, 29th 2024

The NVD has a new announcement page with status updates, news, and how to stay connected!

CVE-2023-52799 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: jfs: fix array-index-out-of-bounds in dbFindLeaf Currently while searching for dmtree_t for sufficient free blocks there is an array out of bounds while getting element in tp->dm_stree. To add the required check for out of bound we first need to determine the type of dmtree. Thus added an extra parameter to dbFindLeaf so that the type of tree can be determined and the required check can be applied.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource
https://git.kernel.org/stable/c/20f9310a18e3e99fc031e036fcbed67105ae1859
https://git.kernel.org/stable/c/22cad8bc1d36547cdae0eef316c47d917ce3147c
https://git.kernel.org/stable/c/81aa58cd8495b8c3b527f58ccbe19478d8087f61
https://git.kernel.org/stable/c/86df90f3fea7c5591f05c8a0010871d435e83046
https://git.kernel.org/stable/c/87c681ab49e99039ff2dd3e71852417381b13878
https://git.kernel.org/stable/c/88b7894a8f8705bf4e7ea90b10229376abf14514
https://git.kernel.org/stable/c/a50b796d36719757526ee094c703378895ab5e67
https://git.kernel.org/stable/c/da3da5e1e6f71c21d8e6149d7076d936ef5d4cb9
https://git.kernel.org/stable/c/ecfb47f13b08b02cf28b7b50d4941eefa21954d2

Weakness Enumeration

CWE-ID CWE Name Source

Change History

2 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2023-52799
NVD Published Date:
05/21/2024
NVD Last Modified:
05/21/2024
Source:
kernel.org