Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2023-52799 |
CWE-ID | CWE-125 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software Subscribe |
Linux kernel Operating systems & Components / Operating system |
Vendor | Linux Foundation |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU90281
Risk: Low
CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2023-52799
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the dbAllocCtl(), dbFindCtl(), dbAllocDmapLev(), dbAdjTree() and dbFindLeaf() functions in fs/jfs/jfs_dmap.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall update from vendor's website.
Vulnerable software versionsLinux kernel: All versions
External linkshttp://git.kernel.org/stable/c/20f9310a18e3e99fc031e036fcbed67105ae1859
http://git.kernel.org/stable/c/86df90f3fea7c5591f05c8a0010871d435e83046
http://git.kernel.org/stable/c/ecfb47f13b08b02cf28b7b50d4941eefa21954d2
http://git.kernel.org/stable/c/81aa58cd8495b8c3b527f58ccbe19478d8087f61
http://git.kernel.org/stable/c/da3da5e1e6f71c21d8e6149d7076d936ef5d4cb9
http://git.kernel.org/stable/c/a50b796d36719757526ee094c703378895ab5e67
http://git.kernel.org/stable/c/88b7894a8f8705bf4e7ea90b10229376abf14514
http://git.kernel.org/stable/c/87c681ab49e99039ff2dd3e71852417381b13878
http://git.kernel.org/stable/c/22cad8bc1d36547cdae0eef316c47d917ce3147c
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.