{"id":"CVE-2023-52799","summary":"jfs: fix array-index-out-of-bounds in dbFindLeaf","details":"In the Linux kernel, the following vulnerability has been resolved:\n\njfs: fix array-index-out-of-bounds in dbFindLeaf\n\nCurrently while searching for dmtree_t for sufficient free blocks there\nis an array out of bounds while getting element in tp-\u003edm_stree. To add\nthe required check for out of bound we first need to determine the type\nof dmtree. Thus added an extra parameter to dbFindLeaf so that the type\nof tree can be determined and the required check can be applied.","modified":"2026-04-02T09:43:21.216681Z","published":"2024-05-21T15:31:12.351Z","related":["SUSE-SU-2024:2008-1","SUSE-SU-2024:2011-1","SUSE-SU-2024:2019-1","SUSE-SU-2024:2189-1","SUSE-SU-2024:2190-1","SUSE-SU-2024:2571-1","SUSE-SU-2024:2896-1","SUSE-SU-2024:2973-1","SUSE-SU-2025:20008-1","SUSE-SU-2025:20028-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52799.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/20f9310a18e3e99fc031e036fcbed67105ae1859"},{"type":"WEB","url":"https://git.kernel.org/stable/c/22cad8bc1d36547cdae0eef316c47d917ce3147c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/81aa58cd8495b8c3b527f58ccbe19478d8087f61"},{"type":"WEB","url":"https://git.kernel.org/stable/c/86df90f3fea7c5591f05c8a0010871d435e83046"},{"type":"WEB","url":"https://git.kernel.org/stable/c/87c681ab49e99039ff2dd3e71852417381b13878"},{"type":"WEB","url":"https://git.kernel.org/stable/c/88b7894a8f8705bf4e7ea90b10229376abf14514"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a50b796d36719757526ee094c703378895ab5e67"},{"type":"WEB","url":"https://git.kernel.org/stable/c/da3da5e1e6f71c21d8e6149d7076d936ef5d4cb9"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ecfb47f13b08b02cf28b7b50d4941eefa21954d2"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52799.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52799"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"1da177e4c3f41524e886b7f1b8a0c1fc7321cac2"},{"fixed":"20f9310a18e3e99fc031e036fcbed67105ae1859"},{"fixed":"86df90f3fea7c5591f05c8a0010871d435e83046"},{"fixed":"ecfb47f13b08b02cf28b7b50d4941eefa21954d2"},{"fixed":"81aa58cd8495b8c3b527f58ccbe19478d8087f61"},{"fixed":"da3da5e1e6f71c21d8e6149d7076d936ef5d4cb9"},{"fixed":"a50b796d36719757526ee094c703378895ab5e67"},{"fixed":"88b7894a8f8705bf4e7ea90b10229376abf14514"},{"fixed":"87c681ab49e99039ff2dd3e71852417381b13878"},{"fixed":"22cad8bc1d36547cdae0eef316c47d917ce3147c"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-52799.json"}}],"schema_version":"1.7.5"}