#VU90281 Out-of-bounds read in Linux kernel


Published: 2024-05-31

Vulnerability identifier: #VU90281

Vulnerability risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52799

CWE-ID: CWE-125

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the dbAllocCtl(), dbFindCtl(), dbAllocDmapLev(), dbAdjTree() and dbFindLeaf() functions in fs/jfs/jfs_dmap.c. A local user can perform a denial of service (DoS) attack.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel:


External links
http://git.kernel.org/stable/c/20f9310a18e3e99fc031e036fcbed67105ae1859
http://git.kernel.org/stable/c/86df90f3fea7c5591f05c8a0010871d435e83046
http://git.kernel.org/stable/c/ecfb47f13b08b02cf28b7b50d4941eefa21954d2
http://git.kernel.org/stable/c/81aa58cd8495b8c3b527f58ccbe19478d8087f61
http://git.kernel.org/stable/c/da3da5e1e6f71c21d8e6149d7076d936ef5d4cb9
http://git.kernel.org/stable/c/a50b796d36719757526ee094c703378895ab5e67
http://git.kernel.org/stable/c/88b7894a8f8705bf4e7ea90b10229376abf14514
http://git.kernel.org/stable/c/87c681ab49e99039ff2dd3e71852417381b13878
http://git.kernel.org/stable/c/22cad8bc1d36547cdae0eef316c47d917ce3147c


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability