{"id":"CVE-2023-52805","summary":"jfs: fix array-index-out-of-bounds in diAlloc","details":"In the Linux kernel, the following vulnerability has been resolved:\n\njfs: fix array-index-out-of-bounds in diAlloc\n\nCurrently there is not check against the agno of the iag while\nallocating new inodes to avoid fragmentation problem. Added the check\nwhich is required.","modified":"2026-04-02T09:43:21.936567Z","published":"2024-05-21T15:31:16.374Z","related":["SUSE-SU-2024:2008-1","SUSE-SU-2024:2011-1","SUSE-SU-2024:2019-1","SUSE-SU-2024:2189-1","SUSE-SU-2024:2190-1","SUSE-SU-2024:2571-1","SUSE-SU-2024:2896-1","SUSE-SU-2024:2973-1","SUSE-SU-2025:20008-1","SUSE-SU-2025:20028-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52805.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/05d9ea1ceb62a55af6727a69269a4fd310edf483"},{"type":"WEB","url":"https://git.kernel.org/stable/c/1708d0a9917fea579cc9da3d87b154285abd2cd8"},{"type":"WEB","url":"https://git.kernel.org/stable/c/1ba7df5457dc1c1071c5f92ac11323533a6430e1"},{"type":"WEB","url":"https://git.kernel.org/stable/c/2308d0fb0dc32446b4e6ca37cd09c30374bb64e9"},{"type":"WEB","url":"https://git.kernel.org/stable/c/64f062baf202b82f54987a3f614a6c8f3e466641"},{"type":"WEB","url":"https://git.kernel.org/stable/c/665b44e55c2767a4f899c3b18f49e9e1c9983777"},{"type":"WEB","url":"https://git.kernel.org/stable/c/7467ca10a5ff09b0e87edf6c4d2a4bfdee69cf2c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/8c68af2af697ba2ba3b138be0c6d72e2ce3a3d6d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/cf7e3e84df36a9953796c737f080712f631d7083"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52805.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52805"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"1da177e4c3f41524e886b7f1b8a0c1fc7321cac2"},{"fixed":"2308d0fb0dc32446b4e6ca37cd09c30374bb64e9"},{"fixed":"cf7e3e84df36a9953796c737f080712f631d7083"},{"fixed":"7467ca10a5ff09b0e87edf6c4d2a4bfdee69cf2c"},{"fixed":"1ba7df5457dc1c1071c5f92ac11323533a6430e1"},{"fixed":"64f062baf202b82f54987a3f614a6c8f3e466641"},{"fixed":"8c68af2af697ba2ba3b138be0c6d72e2ce3a3d6d"},{"fixed":"665b44e55c2767a4f899c3b18f49e9e1c9983777"},{"fixed":"1708d0a9917fea579cc9da3d87b154285abd2cd8"},{"fixed":"05d9ea1ceb62a55af6727a69269a4fd310edf483"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-52805.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}