{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2023-53486","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2025-10-01T11:39:39.402Z","datePublished":"2025-10-01T11:42:54.028Z","dateUpdated":"2026-05-11T19:45:55.116Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T19:45:55.116Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nfs/ntfs3: Enhance the attribute size check\n\nThis combines the overflow and boundary check so that all attribute size\nwill be properly examined while enumerating them.\n\n[  169.181521] BUG: KASAN: slab-out-of-bounds in run_unpack+0x2e3/0x570\n[  169.183161] Read of size 1 at addr ffff8880094b6240 by task mount/247\n[  169.184046]\n[  169.184925] CPU: 0 PID: 247 Comm: mount Not tainted 6.0.0-rc7+ #3\n[  169.185908] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014\n[  169.187066] Call Trace:\n[  169.187492]  <TASK>\n[  169.188049]  dump_stack_lvl+0x49/0x63\n[  169.188495]  print_report.cold+0xf5/0x689\n[  169.188964]  ? run_unpack+0x2e3/0x570\n[  169.189331]  kasan_report+0xa7/0x130\n[  169.189714]  ? run_unpack+0x2e3/0x570\n[  169.190079]  __asan_load1+0x51/0x60\n[  169.190634]  run_unpack+0x2e3/0x570\n[  169.191290]  ? run_pack+0x840/0x840\n[  169.191569]  ? run_lookup_entry+0xb3/0x1f0\n[  169.192443]  ? mi_enum_attr+0x20a/0x230\n[  169.192886]  run_unpack_ex+0xad/0x3e0\n[  169.193276]  ? run_unpack+0x570/0x570\n[  169.193557]  ? ni_load_mi+0x80/0x80\n[  169.193889]  ? debug_smp_processor_id+0x17/0x20\n[  169.194236]  ? mi_init+0x4a/0x70\n[  169.194496]  attr_load_runs_vcn+0x166/0x1c0\n[  169.194851]  ? attr_data_write_resident+0x250/0x250\n[  169.195188]  mi_read+0x133/0x2c0\n[  169.195481]  ntfs_iget5+0x277/0x1780\n[  169.196017]  ? call_rcu+0x1c7/0x330\n[  169.196392]  ? ntfs_get_block_bmap+0x70/0x70\n[  169.196708]  ? evict+0x223/0x280\n[  169.197014]  ? __kmalloc+0x33/0x540\n[  169.197305]  ? wnd_init+0x15b/0x1b0\n[  169.197599]  ntfs_fill_super+0x1026/0x1ba0\n[  169.197994]  ? put_ntfs+0x1d0/0x1d0\n[  169.198299]  ? vsprintf+0x20/0x20\n[  169.198583]  ? mutex_unlock+0x81/0xd0\n[  169.198930]  ? set_blocksize+0x95/0x150\n[  169.199269]  get_tree_bdev+0x232/0x370\n[  169.199750]  ? put_ntfs+0x1d0/0x1d0\n[  169.200094]  ntfs_fs_get_tree+0x15/0x20\n[  169.200431]  vfs_get_tree+0x4c/0x130\n[  169.200714]  path_mount+0x654/0xfe0\n[  169.201067]  ? putname+0x80/0xa0\n[  169.201358]  ? finish_automount+0x2e0/0x2e0\n[  169.201965]  ? putname+0x80/0xa0\n[  169.202445]  ? kmem_cache_free+0x1c4/0x440\n[  169.203075]  ? putname+0x80/0xa0\n[  169.203414]  do_mount+0xd6/0xf0\n[  169.203719]  ? path_mount+0xfe0/0xfe0\n[  169.203977]  ? __kasan_check_write+0x14/0x20\n[  169.204382]  __x64_sys_mount+0xca/0x110\n[  169.204711]  do_syscall_64+0x3b/0x90\n[  169.205059]  entry_SYSCALL_64_after_hwframe+0x63/0xcd\n[  169.205571] RIP: 0033:0x7f67a80e948a\n[  169.206327] Code: 48 8b 0d 11 fa 2a 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 49 89 ca b8 a5 00 00 008\n[  169.208296] RSP: 002b:00007ffddf020f58 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5\n[  169.209253] RAX: ffffffffffffffda RBX: 000055e2547a6060 RCX: 00007f67a80e948a\n[  169.209777] RDX: 000055e2547a6260 RSI: 000055e2547a62e0 RDI: 000055e2547aeaf0\n[  169.210342] RBP: 0000000000000000 R08: 000055e2547a6280 R09: 0000000000000020\n[  169.210843] R10: 00000000c0ed0000 R11: 0000000000000202 R12: 000055e2547aeaf0\n[  169.211307] R13: 000055e2547a6260 R14: 0000000000000000 R15: 00000000ffffffff\n[  169.211913]  </TASK>\n[  169.212304]\n[  169.212680] Allocated by task 0:\n[  169.212963] (stack is not available)\n[  169.213200]\n[  169.213472] The buggy address belongs to the object at ffff8880094b5e00\n[  169.213472]  which belongs to the cache UDP of size 1152\n[  169.214095] The buggy address is located 1088 bytes inside of\n[  169.214095]  1152-byte region [ffff8880094b5e00, ffff8880094b6280)\n[  169.214639]\n[  169.215004] The buggy address belongs to the physical page:\n[  169.215766] page:000000002e324c8c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x94b4\n[  169.218412] head:000000002e324c8c order:2 compound_mapcount:0 compound_pincount:0\n[  169.219078] flags: 0xfffffc0010200(slab|head|node=0|zone=1|lastcpupid=0x1fffff)\n[  169.220272] raw: 000fffffc0010200\n---truncated---"}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["fs/ntfs3/record.c"],"versions":[{"version":"4534a70b7056fd4b9a1c6db5a4ce3c98546b291e","lessThan":"1fd5b80c9339503f3eaa4db3051b37ac506beeab","status":"affected","versionType":"git"},{"version":"4534a70b7056fd4b9a1c6db5a4ce3c98546b291e","lessThan":"277439e7cabd9d4c6334b39a4b99d49b4c97265b","status":"affected","versionType":"git"},{"version":"4534a70b7056fd4b9a1c6db5a4ce3c98546b291e","lessThan":"f28d9e02c2c242e8f9af9e13ba263fcc0211be49","status":"affected","versionType":"git"},{"version":"4534a70b7056fd4b9a1c6db5a4ce3c98546b291e","lessThan":"4f082a7531223a438c757bb20e304f4c941c67a8","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["fs/ntfs3/record.c"],"versions":[{"version":"5.15","status":"affected"},{"version":"0","lessThan":"5.15","status":"unaffected","versionType":"semver"},{"version":"5.15.113","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.80","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.3.4","lessThanOrEqual":"6.3.*","status":"unaffected","versionType":"semver"},{"version":"6.4","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.15","versionEndExcluding":"5.15.113"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.15","versionEndExcluding":"6.1.80"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.15","versionEndExcluding":"6.3.4"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.15","versionEndExcluding":"6.4"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/1fd5b80c9339503f3eaa4db3051b37ac506beeab"},{"url":"https://git.kernel.org/stable/c/277439e7cabd9d4c6334b39a4b99d49b4c97265b"},{"url":"https://git.kernel.org/stable/c/f28d9e02c2c242e8f9af9e13ba263fcc0211be49"},{"url":"https://git.kernel.org/stable/c/4f082a7531223a438c757bb20e304f4c941c67a8"}],"title":"fs/ntfs3: Enhance the attribute size check","x_generator":{"engine":"bippy-1.2.0"}}}}