In the Linux kernel, the following vulnerability has been resolved:
fs/jfs: Add validity check for db_maxag and db_agpref
Both db_maxag and db_agpref are used as the index of the
db_agfree array, but there is currently no validity check for
db_maxag and db_agpref, which can lead to errors.
The following is related bug reported by Syzbot:
UBSAN: array-index-out-of-bounds in fs/jfs/jfs_dmap.c:639:20
index 7936 is out of range for type 'atomic_t[128]'
Add checking that the values of db_maxag and db_agpref are valid
indexes for the db_agfree array.
References
Configurations
Configuration 1 (hide)
|
History
23 Sep 2025, 22:40
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/1f74d336990f37703a8eee77153463d65b67f70e - Patch | |
References | () https://git.kernel.org/stable/c/2323de34a3ae61a9f9b544c18583f71cea86721f - Patch | |
References | () https://git.kernel.org/stable/c/32bd8f1cbcf8b663e29dd1f908ba3a129541a11b - Patch | |
References | () https://git.kernel.org/stable/c/5013f8269887642cca784adc8db9b5f0b771533f - Patch | |
References | () https://git.kernel.org/stable/c/64933ab7b04881c6c18b21ff206c12278341c72e - Patch | |
References | () https://git.kernel.org/stable/c/a0649e2dd4a3595b5595a29d0064d047c2fae2fb - Patch | |
References | () https://git.kernel.org/stable/c/c6c8863fb3f57700ab583d875adda04caaf2278a - Patch | |
References | () https://git.kernel.org/stable/c/ce15b0f1a431168f07b1cc6c9f71206a2db5c809 - Patch | |
References | () https://git.kernel.org/stable/c/dca403bb035a565bb98ecc1dda5d30f676feda40 - Patch | |
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
First Time |
Linux
Linux linux Kernel |
|
CWE | CWE-129 |
21 Nov 2024, 08:40
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/1f74d336990f37703a8eee77153463d65b67f70e - | |
References | () https://git.kernel.org/stable/c/2323de34a3ae61a9f9b544c18583f71cea86721f - | |
References | () https://git.kernel.org/stable/c/32bd8f1cbcf8b663e29dd1f908ba3a129541a11b - | |
References | () https://git.kernel.org/stable/c/5013f8269887642cca784adc8db9b5f0b771533f - | |
References | () https://git.kernel.org/stable/c/64933ab7b04881c6c18b21ff206c12278341c72e - | |
References | () https://git.kernel.org/stable/c/a0649e2dd4a3595b5595a29d0064d047c2fae2fb - | |
References | () https://git.kernel.org/stable/c/c6c8863fb3f57700ab583d875adda04caaf2278a - | |
References | () https://git.kernel.org/stable/c/ce15b0f1a431168f07b1cc6c9f71206a2db5c809 - | |
References | () https://git.kernel.org/stable/c/dca403bb035a565bb98ecc1dda5d30f676feda40 - | |
Summary |
|
21 May 2024, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-05-21 16:15
Updated : 2025-09-23 22:40
NVD link : CVE-2023-52804
Mitre link : CVE-2023-52804
CVE.ORG link : CVE-2023-52804
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-129
Improper Validation of Array Index