In the Linux kernel, the following vulnerability has been resolved:
ext4: add bounds checking in get_max_inline_xattr_value_size()
Normally the extended attributes in the inode body would have been
checked when the inode is first opened, but if someone is writing to
the block device while the file system is mounted, it's possible for
the inode table to get corrupted. Add bounds checking to avoid
reading beyond the end of allocated memory if this happens.
Metrics
Affected Vendors & Products
References
History
Wed, 17 Sep 2025 11:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Linux
Linux linux Kernel |
|
Vendors & Products |
Linux
Linux linux Kernel |
Wed, 17 Sep 2025 00:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Tue, 16 Sep 2025 08:15:00 +0000

Status: PUBLISHED
Assigner: Linux
Published: 2025-09-16T08:11:18.585Z
Updated: 2025-09-16T08:11:18.585Z
Reserved: 2025-09-16T08:09:37.991Z
Link: CVE-2023-53285

No data.

Status : Awaiting Analysis
Published: 2025-09-16T08:15:37.540
Modified: 2025-09-16T12:49:16.060
Link: CVE-2023-53285
