In the Linux kernel, the following vulnerability has been resolved:
ext4: add bounds checking in get_max_inline_xattr_value_size()
Normally the extended attributes in the inode body would have been
checked when the inode is first opened, but if someone is writing to
the block device while the file system is mounted, it's possible for
the inode table to get corrupted. Add bounds checking to avoid
reading beyond the end of allocated memory if this happens.
References
Configurations
Configuration 1 (hide)
|
History
02 Dec 2025, 21:23
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Linux linux Kernel
Linux |
|
| CWE | NVD-CWE-noinfo | |
| References | () https://git.kernel.org/stable/c/1d2caddbeeee56fbbc36b428c5b909c3ad88eb7f - Patch | |
| References | () https://git.kernel.org/stable/c/2220eaf90992c11d888fe771055d4de330385f01 - Patch | |
| References | () https://git.kernel.org/stable/c/3d7b8fbcd2273e2b9f4c6de5ce2f4c0cd3cb1205 - Patch | |
| References | () https://git.kernel.org/stable/c/4597554b4f7b29e7fd78aa449bab648f8da4ee2c - Patch | |
| References | () https://git.kernel.org/stable/c/486efbbc9445dca7890a1b86adbccb88b91284b0 - Patch | |
| References | () https://git.kernel.org/stable/c/5a229d21b98d132673096710e8281ef522dab1d1 - Patch | |
| References | () https://git.kernel.org/stable/c/88a06a94942c5c0a896e9da1113a6bb29e36cbef - Patch | |
| References | () https://git.kernel.org/stable/c/e780058bd75614b66882bc02620ddbd884171560 - Patch | |
| References | () https://git.kernel.org/stable/c/f22b274429e88d3dc7e79d375b56ce4f2f59f0b4 - Patch | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
| CPE | cpe:2.3:o:linux:linux_kernel:6.4:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
Information
Published : 2025-09-16 08:15
Updated : 2025-12-02 21:23
NVD link : CVE-2023-53285
Mitre link : CVE-2023-53285
CVE.ORG link : CVE-2023-53285
JSON object : View
Products Affected
linux
- linux_kernel
CWE
