๐Ÿ” CVE Alert

CVE-2024-47723

UNKNOWN 0.0

jfs: fix out-of-bounds in dbNextAG() and diAlloc()

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: jfs: fix out-of-bounds in dbNextAG() and diAlloc() In dbNextAG() , there is no check for the case where bmp->db_numag is greater or same than MAXAG due to a polluted image, which causes an out-of-bounds. Therefore, a bounds check should be added in dbMount(). And in dbNextAG(), a check for the case where agpref is greater than bmp->db_numag should be added, so an out-of-bounds exception should be prevented. Additionally, a check for the case where agno is greater or same than MAXAG should be added in diAlloc() to prevent out-of-bounds.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Oct 21, 2024
Last Updated May 12, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < d1017d2a0f3f16dc1db5120e7ddbe7c6680425b0 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 5ad6284c8d433f8a213111c5c44ead4d9705b622 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 0338e66cba272351ca9d7d03f3628e390e70963b 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < ead82533278502428883085a787d5a00f15e5eb9 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 6ce8b6ab44a8b5918c0ee373d4ad19d19017931b 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < c1ba4b8ca799ff1d99d01f37d7ccb7d5ba5533d2 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 128d5cfdcf844cb690c9295a3a1c1114c21fc15a 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 96855f40e152989c9e7c20c4691ace5581098acc 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < e63866a475562810500ea7f784099bfe341e761a
Linux / Linux
2.6.12

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/d1017d2a0f3f16dc1db5120e7ddbe7c6680425b0 git.kernel.org: https://git.kernel.org/stable/c/5ad6284c8d433f8a213111c5c44ead4d9705b622 git.kernel.org: https://git.kernel.org/stable/c/0338e66cba272351ca9d7d03f3628e390e70963b git.kernel.org: https://git.kernel.org/stable/c/ead82533278502428883085a787d5a00f15e5eb9 git.kernel.org: https://git.kernel.org/stable/c/6ce8b6ab44a8b5918c0ee373d4ad19d19017931b git.kernel.org: https://git.kernel.org/stable/c/c1ba4b8ca799ff1d99d01f37d7ccb7d5ba5533d2 git.kernel.org: https://git.kernel.org/stable/c/128d5cfdcf844cb690c9295a3a1c1114c21fc15a git.kernel.org: https://git.kernel.org/stable/c/96855f40e152989c9e7c20c4691ace5581098acc git.kernel.org: https://git.kernel.org/stable/c/e63866a475562810500ea7f784099bfe341e761a lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-265688.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-355557.html