In the Linux kernel, the following vulnerability has been resolved:
ext4: remove a BUGON in ext4mbreleasegroup_pa()
If a malicious fuzzer overwrites the ext4 superblock while it is mounted such that the sfirstdatablock is set to a very large number, the calculation of the block group can underflow, and trigger a BUGON check. Change this to be an ext4_warning so that we don't crash the kernel.
{
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53450.json",
"cna_assigner": "Linux"
}