#VU88885 Improper validation of array index in Linux kernel


Published: 2024-04-22

Vulnerability identifier: #VU88885

Vulnerability risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52603

CWE-ID: CWE-129

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper validation of array index within the dtSplitRoot() function in fs/jfs/jfs_dtree.c. A local user can perform a denial of service (DoS) attack.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

Linux kernel:


External links
http://git.kernel.org/stable/c/e30b52a2ea3d1e0aaee68096957cf90a2f4ec5af
http://git.kernel.org/stable/c/fd3486a893778770557649fe28afa5e463d4ed07
http://git.kernel.org/stable/c/7aa33854477d9c346f5560a1a1fcb3fe7783e2a8
http://git.kernel.org/stable/c/e4ce01c25ccbea02a09a5291c21749b1fc358e39
http://git.kernel.org/stable/c/e4cbc857d75d4e22a1f75446e7480b1f305d8d60
http://git.kernel.org/stable/c/edff092a59260bf0b0a2eba219cb3da6372c2f9f
http://git.kernel.org/stable/c/6e2902ecc77e9760a9fc447f56d598383e2372d2
http://git.kernel.org/stable/c/27e56f59bab5ddafbcfe69ad7a4a6ea1279c1b16


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability