#VU90283 Out-of-bounds read in Linux kernel


Published: 2024-05-31

Vulnerability identifier: #VU90283

Vulnerability risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52805

CWE-ID: CWE-125

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the diInitInode() and diAlloc() functions in fs/jfs/jfs_imap.c. A local user can perform a denial of service (DoS) attack.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Linux kernel:


External links
http://git.kernel.org/stable/c/2308d0fb0dc32446b4e6ca37cd09c30374bb64e9
http://git.kernel.org/stable/c/cf7e3e84df36a9953796c737f080712f631d7083
http://git.kernel.org/stable/c/7467ca10a5ff09b0e87edf6c4d2a4bfdee69cf2c
http://git.kernel.org/stable/c/1ba7df5457dc1c1071c5f92ac11323533a6430e1
http://git.kernel.org/stable/c/64f062baf202b82f54987a3f614a6c8f3e466641
http://git.kernel.org/stable/c/8c68af2af697ba2ba3b138be0c6d72e2ce3a3d6d
http://git.kernel.org/stable/c/665b44e55c2767a4f899c3b18f49e9e1c9983777
http://git.kernel.org/stable/c/1708d0a9917fea579cc9da3d87b154285abd2cd8
http://git.kernel.org/stable/c/05d9ea1ceb62a55af6727a69269a4fd310edf483


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability