U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

NOTICE UPDATED - May, 29th 2024

The NVD has a new announcement page with status updates, news, and how to stay connected!

CVE-2023-52804 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: fs/jfs: Add validity check for db_maxag and db_agpref Both db_maxag and db_agpref are used as the index of the db_agfree array, but there is currently no validity check for db_maxag and db_agpref, which can lead to errors. The following is related bug reported by Syzbot: UBSAN: array-index-out-of-bounds in fs/jfs/jfs_dmap.c:639:20 index 7936 is out of range for type 'atomic_t[128]' Add checking that the values of db_maxag and db_agpref are valid indexes for the db_agfree array.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource
https://git.kernel.org/stable/c/1f74d336990f37703a8eee77153463d65b67f70e
https://git.kernel.org/stable/c/2323de34a3ae61a9f9b544c18583f71cea86721f
https://git.kernel.org/stable/c/32bd8f1cbcf8b663e29dd1f908ba3a129541a11b
https://git.kernel.org/stable/c/5013f8269887642cca784adc8db9b5f0b771533f
https://git.kernel.org/stable/c/64933ab7b04881c6c18b21ff206c12278341c72e
https://git.kernel.org/stable/c/a0649e2dd4a3595b5595a29d0064d047c2fae2fb
https://git.kernel.org/stable/c/c6c8863fb3f57700ab583d875adda04caaf2278a
https://git.kernel.org/stable/c/ce15b0f1a431168f07b1cc6c9f71206a2db5c809
https://git.kernel.org/stable/c/dca403bb035a565bb98ecc1dda5d30f676feda40

Weakness Enumeration

CWE-ID CWE Name Source

Change History

2 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2023-52804
NVD Published Date:
05/21/2024
NVD Last Modified:
05/21/2024
Source:
kernel.org