-

CVE-2023-53222

In the Linux kernel, the following vulnerability has been resolved:

jfs: jfs_dmap: Validate db_l2nbperpage while mounting

In jfs_dmap.c at line 381, BLKTODMAP is used to get a logical block
number inside dbFree(). db_l2nbperpage, which is the log2 number of
blocks per page, is passed as an argument to BLKTODMAP which uses it
for shifting.

Syzbot reported a shift out-of-bounds crash because db_l2nbperpage is
too big. This happens because the large value is set without any
validation in dbMount() at line 181.

Thus, make sure that db_l2nbperpage is correct while mounting.

Max number of blocks per page = Page size / Min block size
=> log2(Max num_block per page) = log2(Page size / Min block size)
				= log2(Page size) - log2(Min block size)

=> Max db_l2nbperpage = L2PSIZE - L2MINBLOCKSIZE

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < 8c1efe3f74a7864461b0dff281c5562154b4aa8e
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < ef5c205b6e6f8d1f18ef0b4a9832b1b5fa85f7f2
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < a4855aeb13e4ad1f23e16753b68212e180f7d848
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 47b7eaae08e8b2f25bdf37bc14d21be090bcb20f
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < de984faecddb900fa850af4df574a25b32bb93f5
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < c7feb54b113802d2aba98708769d3c33fb017254
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 2a03c4e683d33d17b667418eb717b13dda1fac6b
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 11509910c599cbd04585ec35a6d5e1a0053d84c1
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version <= 4.14.*
Version 4.14.322
Status unaffected
Version <= 4.19.*
Version 4.19.291
Status unaffected
Version <= 5.4.*
Version 5.4.251
Status unaffected
Version <= 5.10.*
Version 5.10.188
Status unaffected
Version <= 5.15.*
Version 5.15.121
Status unaffected
Version <= 6.1.*
Version 6.1.40
Status unaffected
Version <= 6.4.*
Version 6.4.5
Status unaffected
Version <= *
Version 6.5
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.03% 0.078
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string