CVE-2023-53285

In the Linux kernel, the following vulnerability has been resolved:

ext4: add bounds checking in get_max_inline_xattr_value_size()

Normally the extended attributes in the inode body would have been
checked when the inode is first opened, but if someone is writing to
the block device while the file system is mounted, it's possible for
the inode table to get corrupted.  Add bounds checking to avoid
reading beyond the end of allocated memory if this happens.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.8 HIGH
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
LinuxCNA
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 2%
VendorProductVersion
linuxlinux_kernel
𝑥
< 4.14.315
linuxlinux_kernel
4.15 ≤
𝑥
< 4.19.283
linuxlinux_kernel
4.20 ≤
𝑥
< 5.4.243
linuxlinux_kernel
5.5 ≤
𝑥
< 5.10.180
linuxlinux_kernel
5.11 ≤
𝑥
< 5.15.112
linuxlinux_kernel
5.16 ≤
𝑥
< 6.1.29
linuxlinux_kernel
6.2 ≤
𝑥
< 6.2.16
linuxlinux_kernel
6.3 ≤
𝑥
< 6.3.3
linuxlinux_kernel
6.4:rc1
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
linux
bullseye
5.10.223-1
fixed
bullseye (security)
5.10.237-1
fixed
bookworm
6.1.148-1
fixed
bookworm (security)
6.1.147-1
fixed
trixie
6.12.43-1
fixed
trixie (security)
6.12.41-1
fixed
forky
6.16.3-1
fixed
sid
6.16.7-1
fixed