CVE-2023-53285

In the Linux kernel, the following vulnerability has been resolved: ext4: add bounds checking in get_max_inline_xattr_value_size() Normally the extended attributes in the inode body would have been checked when the inode is first opened, but if someone is writing to the block device while the file system is mounted, it's possible for the inode table to get corrupted. Add bounds checking to avoid reading beyond the end of allocated memory if this happens.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.4:rc1:*:*:*:*:*:*

History

02 Dec 2025, 21:23

Type Values Removed Values Added
First Time Linux linux Kernel
Linux
CWE NVD-CWE-noinfo
References () https://git.kernel.org/stable/c/1d2caddbeeee56fbbc36b428c5b909c3ad88eb7f - () https://git.kernel.org/stable/c/1d2caddbeeee56fbbc36b428c5b909c3ad88eb7f - Patch
References () https://git.kernel.org/stable/c/2220eaf90992c11d888fe771055d4de330385f01 - () https://git.kernel.org/stable/c/2220eaf90992c11d888fe771055d4de330385f01 - Patch
References () https://git.kernel.org/stable/c/3d7b8fbcd2273e2b9f4c6de5ce2f4c0cd3cb1205 - () https://git.kernel.org/stable/c/3d7b8fbcd2273e2b9f4c6de5ce2f4c0cd3cb1205 - Patch
References () https://git.kernel.org/stable/c/4597554b4f7b29e7fd78aa449bab648f8da4ee2c - () https://git.kernel.org/stable/c/4597554b4f7b29e7fd78aa449bab648f8da4ee2c - Patch
References () https://git.kernel.org/stable/c/486efbbc9445dca7890a1b86adbccb88b91284b0 - () https://git.kernel.org/stable/c/486efbbc9445dca7890a1b86adbccb88b91284b0 - Patch
References () https://git.kernel.org/stable/c/5a229d21b98d132673096710e8281ef522dab1d1 - () https://git.kernel.org/stable/c/5a229d21b98d132673096710e8281ef522dab1d1 - Patch
References () https://git.kernel.org/stable/c/88a06a94942c5c0a896e9da1113a6bb29e36cbef - () https://git.kernel.org/stable/c/88a06a94942c5c0a896e9da1113a6bb29e36cbef - Patch
References () https://git.kernel.org/stable/c/e780058bd75614b66882bc02620ddbd884171560 - () https://git.kernel.org/stable/c/e780058bd75614b66882bc02620ddbd884171560 - Patch
References () https://git.kernel.org/stable/c/f22b274429e88d3dc7e79d375b56ce4f2f59f0b4 - () https://git.kernel.org/stable/c/f22b274429e88d3dc7e79d375b56ce4f2f59f0b4 - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CPE cpe:2.3:o:linux:linux_kernel:6.4:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Information

Published : 2025-09-16 08:15

Updated : 2025-12-02 21:23


NVD link : CVE-2023-53285

Mitre link : CVE-2023-53285

CVE.ORG link : CVE-2023-53285


JSON object : View

Products Affected

linux

  • linux_kernel