CVE-2023-53503

Source
https://cve.org/CVERecord?id=CVE-2023-53503
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53503.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-53503
Downstream
Published
2025-10-01T11:45:54.052Z
Modified
2026-03-20T12:33:12.020278Z
Summary
ext4: allow ext4_get_group_info() to fail
Details

In the Linux kernel, the following vulnerability has been resolved:

ext4: allow ext4getgroup_info() to fail

Previously, ext4getgroupinfo() would treat an invalid group number as BUG(), since in theory it should never happen. However, if a malicious attaker (or fuzzer) modifies the superblock via the block device while it is the file system is mounted, it is possible for sfirstdatablock to get set to a very large number. In that case, when calculating the block group of some block number (such as the starting block of a preallocation region), could result in an underflow and very large block group number. Then the BUGON check in ext4getgroupinfo() would fire, resutling in a denial of service attack that can be triggered by root or someone with write access to the block device.

For a quality of implementation perspective, it's best that even if the system administrator does something that they shouldn't, that it will not trigger a BUG. So instead of BUG'ing, ext4getgroupinfo() will call ext4error and return NULL. We also add fallback code in all of the callers of ext4getgroup_info() that it might NULL.

Also, since ext4getgroup_info() was already borderline to be an inline function, un-inline it. The results in a next reduction of the compiled text size of ext4 by roughly 2k.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53503.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
2f2e09eb15849562aede80ed007658e4504ded26
Fixed
100c0ad6c04597fefeaaba2bb1827cc015d95067
Fixed
620a3c28221bb219b81bc0bffd065cc187494302
Fixed
b4319e457d6e3fb33e443efeaf4634fc36e8a9ed
Fixed
31668cebf45adfb6283e465e641c4f5a21b07afa
Fixed
5354b2af34064a4579be8bc0e2f15a7b70f14b5f

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53503.json"