{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2023-53450","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2025-09-17T14:54:09.754Z","datePublished":"2025-10-01T11:42:22.074Z","dateUpdated":"2026-05-11T19:45:14.540Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T19:45:14.540Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\next4: remove a BUG_ON in ext4_mb_release_group_pa()\n\nIf a malicious fuzzer overwrites the ext4 superblock while it is\nmounted such that the s_first_data_block is set to a very large\nnumber, the calculation of the block group can underflow, and trigger\na BUG_ON check.  Change this to be an ext4_warning so that we don't\ncrash the kernel."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["fs/ext4/mballoc.c"],"versions":[{"version":"c9de560ded61faa5b754137b7753da252391c55a","lessThan":"d5bf8f7fb3ee3d99d1303ceb54599ea0599a4a5b","status":"affected","versionType":"git"},{"version":"c9de560ded61faa5b754137b7753da252391c55a","lessThan":"ef16d8a1798db1a1604ac44ca1bd73ec6bebf483","status":"affected","versionType":"git"},{"version":"c9de560ded61faa5b754137b7753da252391c55a","lessThan":"185062a21976fbc38f2efd296951b02c4500cf65","status":"affected","versionType":"git"},{"version":"c9de560ded61faa5b754137b7753da252391c55a","lessThan":"b0fc279de4bf17e1710bb7e83906538ff8f11111","status":"affected","versionType":"git"},{"version":"c9de560ded61faa5b754137b7753da252391c55a","lessThan":"978e5e9111af18741449b81fefd531a622dd969a","status":"affected","versionType":"git"},{"version":"c9de560ded61faa5b754137b7753da252391c55a","lessThan":"d87a4e4094c9879fc8acdff8ce59fdffa979c8e0","status":"affected","versionType":"git"},{"version":"c9de560ded61faa5b754137b7753da252391c55a","lessThan":"bf2a16eb4e6d06124bd8436d4546f61539a65f29","status":"affected","versionType":"git"},{"version":"c9de560ded61faa5b754137b7753da252391c55a","lessThan":"53c14e7cc2257191ba15425c15638fc4f8abb92b","status":"affected","versionType":"git"},{"version":"c9de560ded61faa5b754137b7753da252391c55a","lessThan":"463808f237cf73e98a1a45ff7460c2406a150a0b","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["fs/ext4/mballoc.c"],"versions":[{"version":"2.6.25","status":"affected"},{"version":"0","lessThan":"2.6.25","status":"unaffected","versionType":"semver"},{"version":"4.14.315","lessThanOrEqual":"4.14.*","status":"unaffected","versionType":"semver"},{"version":"4.19.283","lessThanOrEqual":"4.19.*","status":"unaffected","versionType":"semver"},{"version":"5.4.243","lessThanOrEqual":"5.4.*","status":"unaffected","versionType":"semver"},{"version":"5.10.180","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.112","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.29","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.2.16","lessThanOrEqual":"6.2.*","status":"unaffected","versionType":"semver"},{"version":"6.3.3","lessThanOrEqual":"6.3.*","status":"unaffected","versionType":"semver"},{"version":"6.4","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.25","versionEndExcluding":"4.14.315"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.25","versionEndExcluding":"4.19.283"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.25","versionEndExcluding":"5.4.243"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.25","versionEndExcluding":"5.10.180"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.25","versionEndExcluding":"5.15.112"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.25","versionEndExcluding":"6.1.29"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.25","versionEndExcluding":"6.2.16"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.25","versionEndExcluding":"6.3.3"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.25","versionEndExcluding":"6.4"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/d5bf8f7fb3ee3d99d1303ceb54599ea0599a4a5b"},{"url":"https://git.kernel.org/stable/c/ef16d8a1798db1a1604ac44ca1bd73ec6bebf483"},{"url":"https://git.kernel.org/stable/c/185062a21976fbc38f2efd296951b02c4500cf65"},{"url":"https://git.kernel.org/stable/c/b0fc279de4bf17e1710bb7e83906538ff8f11111"},{"url":"https://git.kernel.org/stable/c/978e5e9111af18741449b81fefd531a622dd969a"},{"url":"https://git.kernel.org/stable/c/d87a4e4094c9879fc8acdff8ce59fdffa979c8e0"},{"url":"https://git.kernel.org/stable/c/bf2a16eb4e6d06124bd8436d4546f61539a65f29"},{"url":"https://git.kernel.org/stable/c/53c14e7cc2257191ba15425c15638fc4f8abb92b"},{"url":"https://git.kernel.org/stable/c/463808f237cf73e98a1a45ff7460c2406a150a0b"}],"title":"ext4: remove a BUG_ON in ext4_mb_release_group_pa()","x_generator":{"engine":"bippy-1.2.0"}}}}