CVE-2023-53450

Source
https://cve.org/CVERecord?id=CVE-2023-53450
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-53450.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-53450
Downstream
Published
2025-10-01T11:42:22.074Z
Modified
2026-04-02T09:44:13.976379Z
Summary
ext4: remove a BUG_ON in ext4_mb_release_group_pa()
Details

In the Linux kernel, the following vulnerability has been resolved:

ext4: remove a BUGON in ext4mbreleasegroup_pa()

If a malicious fuzzer overwrites the ext4 superblock while it is mounted such that the sfirstdatablock is set to a very large number, the calculation of the block group can underflow, and trigger a BUGON check. Change this to be an ext4_warning so that we don't crash the kernel.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53450.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
c9de560ded61faa5b754137b7753da252391c55a
Fixed
d5bf8f7fb3ee3d99d1303ceb54599ea0599a4a5b
Fixed
ef16d8a1798db1a1604ac44ca1bd73ec6bebf483
Fixed
185062a21976fbc38f2efd296951b02c4500cf65
Fixed
b0fc279de4bf17e1710bb7e83906538ff8f11111
Fixed
978e5e9111af18741449b81fefd531a622dd969a
Fixed
d87a4e4094c9879fc8acdff8ce59fdffa979c8e0
Fixed
bf2a16eb4e6d06124bd8436d4546f61539a65f29
Fixed
53c14e7cc2257191ba15425c15638fc4f8abb92b
Fixed
463808f237cf73e98a1a45ff7460c2406a150a0b

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-53450.json"