CVE-2023-52804

In the Linux kernel, the following vulnerability has been resolved: fs/jfs: Add validity check for db_maxag and db_agpref Both db_maxag and db_agpref are used as the index of the db_agfree array, but there is currently no validity check for db_maxag and db_agpref, which can lead to errors. The following is related bug reported by Syzbot: UBSAN: array-index-out-of-bounds in fs/jfs/jfs_dmap.c:639:20 index 7936 is out of range for type 'atomic_t[128]' Add checking that the values of db_maxag and db_agpref are valid indexes for the db_agfree array.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

23 Sep 2025, 22:40

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/1f74d336990f37703a8eee77153463d65b67f70e - () https://git.kernel.org/stable/c/1f74d336990f37703a8eee77153463d65b67f70e - Patch
References () https://git.kernel.org/stable/c/2323de34a3ae61a9f9b544c18583f71cea86721f - () https://git.kernel.org/stable/c/2323de34a3ae61a9f9b544c18583f71cea86721f - Patch
References () https://git.kernel.org/stable/c/32bd8f1cbcf8b663e29dd1f908ba3a129541a11b - () https://git.kernel.org/stable/c/32bd8f1cbcf8b663e29dd1f908ba3a129541a11b - Patch
References () https://git.kernel.org/stable/c/5013f8269887642cca784adc8db9b5f0b771533f - () https://git.kernel.org/stable/c/5013f8269887642cca784adc8db9b5f0b771533f - Patch
References () https://git.kernel.org/stable/c/64933ab7b04881c6c18b21ff206c12278341c72e - () https://git.kernel.org/stable/c/64933ab7b04881c6c18b21ff206c12278341c72e - Patch
References () https://git.kernel.org/stable/c/a0649e2dd4a3595b5595a29d0064d047c2fae2fb - () https://git.kernel.org/stable/c/a0649e2dd4a3595b5595a29d0064d047c2fae2fb - Patch
References () https://git.kernel.org/stable/c/c6c8863fb3f57700ab583d875adda04caaf2278a - () https://git.kernel.org/stable/c/c6c8863fb3f57700ab583d875adda04caaf2278a - Patch
References () https://git.kernel.org/stable/c/ce15b0f1a431168f07b1cc6c9f71206a2db5c809 - () https://git.kernel.org/stable/c/ce15b0f1a431168f07b1cc6c9f71206a2db5c809 - Patch
References () https://git.kernel.org/stable/c/dca403bb035a565bb98ecc1dda5d30f676feda40 - () https://git.kernel.org/stable/c/dca403bb035a565bb98ecc1dda5d30f676feda40 - Patch
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
First Time Linux
Linux linux Kernel
CWE CWE-129

21 Nov 2024, 08:40

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/1f74d336990f37703a8eee77153463d65b67f70e - () https://git.kernel.org/stable/c/1f74d336990f37703a8eee77153463d65b67f70e -
References () https://git.kernel.org/stable/c/2323de34a3ae61a9f9b544c18583f71cea86721f - () https://git.kernel.org/stable/c/2323de34a3ae61a9f9b544c18583f71cea86721f -
References () https://git.kernel.org/stable/c/32bd8f1cbcf8b663e29dd1f908ba3a129541a11b - () https://git.kernel.org/stable/c/32bd8f1cbcf8b663e29dd1f908ba3a129541a11b -
References () https://git.kernel.org/stable/c/5013f8269887642cca784adc8db9b5f0b771533f - () https://git.kernel.org/stable/c/5013f8269887642cca784adc8db9b5f0b771533f -
References () https://git.kernel.org/stable/c/64933ab7b04881c6c18b21ff206c12278341c72e - () https://git.kernel.org/stable/c/64933ab7b04881c6c18b21ff206c12278341c72e -
References () https://git.kernel.org/stable/c/a0649e2dd4a3595b5595a29d0064d047c2fae2fb - () https://git.kernel.org/stable/c/a0649e2dd4a3595b5595a29d0064d047c2fae2fb -
References () https://git.kernel.org/stable/c/c6c8863fb3f57700ab583d875adda04caaf2278a - () https://git.kernel.org/stable/c/c6c8863fb3f57700ab583d875adda04caaf2278a -
References () https://git.kernel.org/stable/c/ce15b0f1a431168f07b1cc6c9f71206a2db5c809 - () https://git.kernel.org/stable/c/ce15b0f1a431168f07b1cc6c9f71206a2db5c809 -
References () https://git.kernel.org/stable/c/dca403bb035a565bb98ecc1dda5d30f676feda40 - () https://git.kernel.org/stable/c/dca403bb035a565bb98ecc1dda5d30f676feda40 -
Summary
  • (es) En el kernel de Linux, se resolvió la siguiente vulnerabilidad: fs/jfs: agregue verificación de validez para db_maxag y db_agpref. Tanto db_maxag como db_agpref se utilizan como índice de la matriz db_agfree, pero actualmente no hay verificación de validez para db_maxag y db_agpref, lo cual puede dar lugar a errores. El siguiente es un error relacionado reportado por Syzbot: UBSAN: array-index-out-of-bounds in fs/jfs/jfs_dmap.c:639:20 el índice 7936 está fuera de rango para el tipo 'atomic_t[128]' Agregue verificando que el Los valores de db_maxag y db_agpref son índices válidos para la matriz db_agfree.

21 May 2024, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-21 16:15

Updated : 2025-09-23 22:40


NVD link : CVE-2023-52804

Mitre link : CVE-2023-52804

CVE.ORG link : CVE-2023-52804


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-129

Improper Validation of Array Index