CVE-2023-53503
BaseFortify
Publication date: 2025-10-01
Last updated on: 2026-04-06
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is in the Linux kernel's ext4 file system. The function ext4_get_group_info() previously treated an invalid group number as a critical error (BUG()), which should theoretically never happen. However, if a malicious attacker or fuzzer modifies the superblock via the block device while the file system is mounted, it can cause an invalid large block group number due to an underflow. This triggers the BUG_ON check, causing the system to crash or become unavailable (denial of service). The fix changes ext4_get_group_info() to handle such invalid cases gracefully by returning NULL instead of crashing, improving system stability.
How can this vulnerability impact me? :
This vulnerability can lead to a denial of service (DoS) attack on systems using the ext4 file system. An attacker with root or write access to the block device can manipulate the superblock to cause the system to crash or become unavailable. This disrupts normal operations and can cause system downtime.