Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2023-52602

Summary
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
Published At-06 Mar, 2024 | 06:45
Updated At-04 May, 2025 | 07:39
Rejected At-
Credits

jfs: fix slab-out-of-bounds Read in dtSearch

In the Linux kernel, the following vulnerability has been resolved: jfs: fix slab-out-of-bounds Read in dtSearch Currently while searching for current page in the sorted entry table of the page there is a out of bound access. Added a bound check to fix the error. Dave: Set return code to -EIO

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:Linux
Assigner Org ID:416baaa9-dc9f-4396-8d5f-8c081fb06d67
Published At:06 Mar, 2024 | 06:45
Updated At:04 May, 2025 | 07:39
Rejected At:
▼CVE Numbering Authority (CNA)
jfs: fix slab-out-of-bounds Read in dtSearch

In the Linux kernel, the following vulnerability has been resolved: jfs: fix slab-out-of-bounds Read in dtSearch Currently while searching for current page in the sorted entry table of the page there is a out of bound access. Added a bound check to fix the error. Dave: Set return code to -EIO

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • fs/jfs/jfs_dtree.c
Default Status
unaffected
Versions
Affected
  • From 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before ce8bc22e948634a5c0a3fa58a179177d0e3f3950 (git)
  • From 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 1b9d6828589d57f94a23fb1c46112cda39d7efdb (git)
  • From 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 1c40ca3d39d769931b28295b3145c25f1decf5a6 (git)
  • From 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 6c6a96c3d74df185ee344977d46944d6f33bb4dd (git)
  • From 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before cab0c265ba182fd266c2aa3c69d7e40640a7f612 (git)
  • From 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before 7110650b85dd2f1cee819acd1345a9013a1a62f7 (git)
  • From 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before bff9d4078a232c01e42e9377d005fb2f4d31a472 (git)
  • From 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 before fa5492ee89463a7590a1449358002ff7ef63529f (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • fs/jfs/jfs_dtree.c
Default Status
affected
Versions
Unaffected
  • From 4.19.307 through 4.19.* (semver)
  • From 5.4.269 through 5.4.* (semver)
  • From 5.10.210 through 5.10.* (semver)
  • From 5.15.149 through 5.15.* (semver)
  • From 6.1.77 through 6.1.* (semver)
  • From 6.6.16 through 6.6.* (semver)
  • From 6.7.4 through 6.7.* (semver)
  • From 6.8 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/ce8bc22e948634a5c0a3fa58a179177d0e3f3950
N/A
https://git.kernel.org/stable/c/1b9d6828589d57f94a23fb1c46112cda39d7efdb
N/A
https://git.kernel.org/stable/c/1c40ca3d39d769931b28295b3145c25f1decf5a6
N/A
https://git.kernel.org/stable/c/6c6a96c3d74df185ee344977d46944d6f33bb4dd
N/A
https://git.kernel.org/stable/c/cab0c265ba182fd266c2aa3c69d7e40640a7f612
N/A
https://git.kernel.org/stable/c/7110650b85dd2f1cee819acd1345a9013a1a62f7
N/A
https://git.kernel.org/stable/c/bff9d4078a232c01e42e9377d005fb2f4d31a472
N/A
https://git.kernel.org/stable/c/fa5492ee89463a7590a1449358002ff7ef63529f
N/A
Hyperlink: https://git.kernel.org/stable/c/ce8bc22e948634a5c0a3fa58a179177d0e3f3950
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/1b9d6828589d57f94a23fb1c46112cda39d7efdb
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/1c40ca3d39d769931b28295b3145c25f1decf5a6
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/6c6a96c3d74df185ee344977d46944d6f33bb4dd
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/cab0c265ba182fd266c2aa3c69d7e40640a7f612
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/7110650b85dd2f1cee819acd1345a9013a1a62f7
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/bff9d4078a232c01e42e9377d005fb2f4d31a472
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/fa5492ee89463a7590a1449358002ff7ef63529f
Resource: N/A
▼Authorized Data Publishers (ADP)
1. CISA ADP Vulnrichment
Affected Products
Vendor
Linux Kernel Organization, Inclinux
Product
linux_kernel
CPEs
  • cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 1da177e4c3f4 before ce8bc22e9486 (custom)
  • From 1da177e4c3f4 before 1b9d6828589d (custom)
  • From 1da177e4c3f4 before 1c40ca3d39d7 (custom)
  • From 1da177e4c3f4 before 6c6a96c3d74d (custom)
  • From 1da177e4c3f4 before cab0c265ba18 (custom)
  • From 1da177e4c3f4 before 7110650b85dd (custom)
  • From 1da177e4c3f4 before bff9d4078a23 (custom)
  • From 1da177e4c3f4 before fa5492ee8946 (custom)
Unaffected
  • From 4.19.307 through 4.20 (custom)
  • From 5.4.269 through 5.5 (custom)
  • From 5.10.210 through 5.11 (custom)
  • From 5.15.149 through 5.16 (custom)
  • From 6.1.77 through 6.2 (custom)
  • From 6.6.16 through 6.7 (custom)
  • From 6.7.4 through 6.8 (custom)
  • From 6.8 through * (custom)
Problem Types
TypeCWE IDDescription
CWECWE-400CWE-400 Uncontrolled Resource Consumption
Type: CWE
CWE ID: CWE-400
Description: CWE-400 Uncontrolled Resource Consumption
Metrics
VersionBase scoreBase severityVector
3.17.8HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Version: 3.1
Base score: 7.8
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
2. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/ce8bc22e948634a5c0a3fa58a179177d0e3f3950
x_transferred
https://git.kernel.org/stable/c/1b9d6828589d57f94a23fb1c46112cda39d7efdb
x_transferred
https://git.kernel.org/stable/c/1c40ca3d39d769931b28295b3145c25f1decf5a6
x_transferred
https://git.kernel.org/stable/c/6c6a96c3d74df185ee344977d46944d6f33bb4dd
x_transferred
https://git.kernel.org/stable/c/cab0c265ba182fd266c2aa3c69d7e40640a7f612
x_transferred
https://git.kernel.org/stable/c/7110650b85dd2f1cee819acd1345a9013a1a62f7
x_transferred
https://git.kernel.org/stable/c/bff9d4078a232c01e42e9377d005fb2f4d31a472
x_transferred
https://git.kernel.org/stable/c/fa5492ee89463a7590a1449358002ff7ef63529f
x_transferred
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
x_transferred
https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html
x_transferred
Hyperlink: https://git.kernel.org/stable/c/ce8bc22e948634a5c0a3fa58a179177d0e3f3950
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/1b9d6828589d57f94a23fb1c46112cda39d7efdb
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/1c40ca3d39d769931b28295b3145c25f1decf5a6
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/6c6a96c3d74df185ee344977d46944d6f33bb4dd
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/cab0c265ba182fd266c2aa3c69d7e40640a7f612
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/7110650b85dd2f1cee819acd1345a9013a1a62f7
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/bff9d4078a232c01e42e9377d005fb2f4d31a472
Resource:
x_transferred
Hyperlink: https://git.kernel.org/stable/c/fa5492ee89463a7590a1449358002ff7ef63529f
Resource:
x_transferred
Hyperlink: https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
Resource:
x_transferred
Hyperlink: https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html
Resource:
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:416baaa9-dc9f-4396-8d5f-8c081fb06d67
Published At:06 Mar, 2024 | 07:15
Updated At:14 Mar, 2025 | 18:49

In the Linux kernel, the following vulnerability has been resolved: jfs: fix slab-out-of-bounds Read in dtSearch Currently while searching for current page in the sorted entry table of the page there is a out of bound access. Added a bound check to fix the error. Dave: Set return code to -EIO

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.17.8HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 3.1
Base score: 7.8
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CPE Matches

Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions before 4.19.307(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 4.20(inclusive) to 5.4.269(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 5.5(inclusive) to 5.10.210(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 5.11(inclusive) to 5.15.149(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 5.16(inclusive) to 6.1.77(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 6.2(inclusive) to 6.6.16(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions from 6.7(inclusive) to 6.7.4(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Debian GNU/Linux
debian
>>debian_linux>>10.0
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-400Secondary134c704f-9b21-4f2e-91b3-4a467353bcc0
CWE ID: CWE-400
Type: Secondary
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://git.kernel.org/stable/c/1b9d6828589d57f94a23fb1c46112cda39d7efdb416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/1c40ca3d39d769931b28295b3145c25f1decf5a6416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/6c6a96c3d74df185ee344977d46944d6f33bb4dd416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/7110650b85dd2f1cee819acd1345a9013a1a62f7416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/bff9d4078a232c01e42e9377d005fb2f4d31a472416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/cab0c265ba182fd266c2aa3c69d7e40640a7f612416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/ce8bc22e948634a5c0a3fa58a179177d0e3f3950416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/fa5492ee89463a7590a1449358002ff7ef63529f416baaa9-dc9f-4396-8d5f-8c081fb06d67
Patch
https://git.kernel.org/stable/c/1b9d6828589d57f94a23fb1c46112cda39d7efdbaf854a3a-2127-422b-91ae-364da2661108
Patch
https://git.kernel.org/stable/c/1c40ca3d39d769931b28295b3145c25f1decf5a6af854a3a-2127-422b-91ae-364da2661108
Patch
https://git.kernel.org/stable/c/6c6a96c3d74df185ee344977d46944d6f33bb4ddaf854a3a-2127-422b-91ae-364da2661108
Patch
https://git.kernel.org/stable/c/7110650b85dd2f1cee819acd1345a9013a1a62f7af854a3a-2127-422b-91ae-364da2661108
Patch
https://git.kernel.org/stable/c/bff9d4078a232c01e42e9377d005fb2f4d31a472af854a3a-2127-422b-91ae-364da2661108
Patch
https://git.kernel.org/stable/c/cab0c265ba182fd266c2aa3c69d7e40640a7f612af854a3a-2127-422b-91ae-364da2661108
Patch
https://git.kernel.org/stable/c/ce8bc22e948634a5c0a3fa58a179177d0e3f3950af854a3a-2127-422b-91ae-364da2661108
Patch
https://git.kernel.org/stable/c/fa5492ee89463a7590a1449358002ff7ef63529faf854a3a-2127-422b-91ae-364da2661108
Patch
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.htmlaf854a3a-2127-422b-91ae-364da2661108
Mailing List
https://lists.debian.org/debian-lts-announce/2024/06/msg00020.htmlaf854a3a-2127-422b-91ae-364da2661108
Mailing List
Hyperlink: https://git.kernel.org/stable/c/1b9d6828589d57f94a23fb1c46112cda39d7efdb
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/1c40ca3d39d769931b28295b3145c25f1decf5a6
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/6c6a96c3d74df185ee344977d46944d6f33bb4dd
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/7110650b85dd2f1cee819acd1345a9013a1a62f7
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/bff9d4078a232c01e42e9377d005fb2f4d31a472
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/cab0c265ba182fd266c2aa3c69d7e40640a7f612
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/ce8bc22e948634a5c0a3fa58a179177d0e3f3950
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/fa5492ee89463a7590a1449358002ff7ef63529f
Source: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/1b9d6828589d57f94a23fb1c46112cda39d7efdb
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/1c40ca3d39d769931b28295b3145c25f1decf5a6
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/6c6a96c3d74df185ee344977d46944d6f33bb4dd
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/7110650b85dd2f1cee819acd1345a9013a1a62f7
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/bff9d4078a232c01e42e9377d005fb2f4d31a472
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/cab0c265ba182fd266c2aa3c69d7e40640a7f612
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/ce8bc22e948634a5c0a3fa58a179177d0e3f3950
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://git.kernel.org/stable/c/fa5492ee89463a7590a1449358002ff7ef63529f
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Hyperlink: https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List

Change History

0
Information is not available yet

Similar CVEs

0Records found

Details not found