In the Linux kernel, the following vulnerability has been resolved:
ext4: add bounds checking in getmaxinlinexattrvalue_size()
Normally the extended attributes in the inode body would have been checked when the inode is first opened, but if someone is writing to the block device while the file system is mounted, it's possible for the inode table to get corrupted. Add bounds checking to avoid reading beyond the end of allocated memory if this happens.
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53285.json"
}[
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"117245050714789018127745402339669719931",
"13694868420343708733718066002210443953",
"81797860064051437109819394733033806418",
"35948604063154710630445719497326370948",
"175596267006091376432838225463095926552",
"119884501571974548933158425195587465272",
"23843887568216283846250285892854576731",
"193252731545387164994699681563772628638",
"92270620868274145851047415274573792977",
"246803674205186233044903276422992631599",
"8196001142706021701554321348418308242",
"83940459347551351115618645035795116289",
"296444724443072848091037140626990101997",
"123926124178914474669300047288131062545"
]
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1d2caddbeeee56fbbc36b428c5b909c3ad88eb7f",
"deprecated": false,
"id": "CVE-2023-53285-032d1305",
"signature_type": "Line",
"target": {
"file": "fs/ext4/inline.c"
},
"signature_version": "v1"
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"117245050714789018127745402339669719931",
"13694868420343708733718066002210443953",
"81797860064051437109819394733033806418",
"35948604063154710630445719497326370948",
"175596267006091376432838225463095926552",
"119884501571974548933158425195587465272",
"23843887568216283846250285892854576731",
"193252731545387164994699681563772628638",
"92270620868274145851047415274573792977",
"246803674205186233044903276422992631599",
"8196001142706021701554321348418308242",
"83940459347551351115618645035795116289",
"296444724443072848091037140626990101997",
"123926124178914474669300047288131062545"
]
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2220eaf90992c11d888fe771055d4de330385f01",
"deprecated": false,
"id": "CVE-2023-53285-64cbd807",
"signature_type": "Line",
"target": {
"file": "fs/ext4/inline.c"
},
"signature_version": "v1"
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"117245050714789018127745402339669719931",
"13694868420343708733718066002210443953",
"81797860064051437109819394733033806418",
"35948604063154710630445719497326370948",
"175596267006091376432838225463095926552",
"119884501571974548933158425195587465272",
"23843887568216283846250285892854576731",
"193252731545387164994699681563772628638",
"92270620868274145851047415274573792977",
"246803674205186233044903276422992631599",
"8196001142706021701554321348418308242",
"83940459347551351115618645035795116289",
"296444724443072848091037140626990101997",
"123926124178914474669300047288131062545"
]
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3d7b8fbcd2273e2b9f4c6de5ce2f4c0cd3cb1205",
"deprecated": false,
"id": "CVE-2023-53285-65404a17",
"signature_type": "Line",
"target": {
"file": "fs/ext4/inline.c"
},
"signature_version": "v1"
},
{
"digest": {
"length": 1169.0,
"function_hash": "118674320397750183219627663235131701658"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@3d7b8fbcd2273e2b9f4c6de5ce2f4c0cd3cb1205",
"deprecated": false,
"id": "CVE-2023-53285-74872616",
"signature_type": "Function",
"target": {
"function": "get_max_inline_xattr_value_size",
"file": "fs/ext4/inline.c"
},
"signature_version": "v1"
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"117245050714789018127745402339669719931",
"13694868420343708733718066002210443953",
"81797860064051437109819394733033806418",
"35948604063154710630445719497326370948",
"175596267006091376432838225463095926552",
"119884501571974548933158425195587465272",
"23843887568216283846250285892854576731",
"193252731545387164994699681563772628638",
"92270620868274145851047415274573792977",
"246803674205186233044903276422992631599",
"8196001142706021701554321348418308242",
"83940459347551351115618645035795116289",
"296444724443072848091037140626990101997",
"123926124178914474669300047288131062545"
]
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5a229d21b98d132673096710e8281ef522dab1d1",
"deprecated": false,
"id": "CVE-2023-53285-74a2070b",
"signature_type": "Line",
"target": {
"file": "fs/ext4/inline.c"
},
"signature_version": "v1"
},
{
"digest": {
"length": 1169.0,
"function_hash": "118674320397750183219627663235131701658"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@2220eaf90992c11d888fe771055d4de330385f01",
"deprecated": false,
"id": "CVE-2023-53285-76c88ba9",
"signature_type": "Function",
"target": {
"function": "get_max_inline_xattr_value_size",
"file": "fs/ext4/inline.c"
},
"signature_version": "v1"
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"117245050714789018127745402339669719931",
"13694868420343708733718066002210443953",
"81797860064051437109819394733033806418",
"35948604063154710630445719497326370948",
"175596267006091376432838225463095926552",
"119884501571974548933158425195587465272",
"23843887568216283846250285892854576731",
"193252731545387164994699681563772628638",
"92270620868274145851047415274573792977",
"246803674205186233044903276422992631599",
"8196001142706021701554321348418308242",
"83940459347551351115618645035795116289",
"296444724443072848091037140626990101997",
"123926124178914474669300047288131062545"
]
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4597554b4f7b29e7fd78aa449bab648f8da4ee2c",
"deprecated": false,
"id": "CVE-2023-53285-84a4168f",
"signature_type": "Line",
"target": {
"file": "fs/ext4/inline.c"
},
"signature_version": "v1"
},
{
"digest": {
"length": 1169.0,
"function_hash": "118674320397750183219627663235131701658"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5a229d21b98d132673096710e8281ef522dab1d1",
"deprecated": false,
"id": "CVE-2023-53285-8f0ffa61",
"signature_type": "Function",
"target": {
"function": "get_max_inline_xattr_value_size",
"file": "fs/ext4/inline.c"
},
"signature_version": "v1"
},
{
"digest": {
"length": 1169.0,
"function_hash": "118674320397750183219627663235131701658"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@4597554b4f7b29e7fd78aa449bab648f8da4ee2c",
"deprecated": false,
"id": "CVE-2023-53285-f4bb463f",
"signature_type": "Function",
"target": {
"function": "get_max_inline_xattr_value_size",
"file": "fs/ext4/inline.c"
},
"signature_version": "v1"
},
{
"digest": {
"length": 1169.0,
"function_hash": "118674320397750183219627663235131701658"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@1d2caddbeeee56fbbc36b428c5b909c3ad88eb7f",
"deprecated": false,
"id": "CVE-2023-53285-fc4c070b",
"signature_type": "Function",
"target": {
"function": "get_max_inline_xattr_value_size",
"file": "fs/ext4/inline.c"
},
"signature_version": "v1"
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-53285.json"