CVE-2023-53503

EUVD-2025-32776
In the Linux kernel, the following vulnerability has been resolved:

ext4: allow ext4_get_group_info() to fail

Previously, ext4_get_group_info() would treat an invalid group number
as BUG(), since in theory it should never happen.  However, if a
malicious attaker (or fuzzer) modifies the superblock via the block
device while it is the file system is mounted, it is possible for
s_first_data_block to get set to a very large number.  In that case,
when calculating the block group of some block number (such as the
starting block of a preallocation region), could result in an
underflow and very large block group number.  Then the BUG_ON check in
ext4_get_group_info() would fire, resutling in a denial of service
attack that can be triggered by root or someone with write access to
the block device.

For a quality of implementation perspective, it's best that even if
the system administrator does something that they shouldn't, that it
will not trigger a BUG.  So instead of BUG'ing, ext4_get_group_info()
will call ext4_error and return NULL.  We also add fallback code in
all of the callers of ext4_get_group_info() that it might NULL.

Also, since ext4_get_group_info() was already borderline to be an
inline function, un-inline it.  The results in a next reduction of the
compiled text size of ext4 by roughly 2k.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
5.5 MEDIUM
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 8%
Affected Products (NVD)
VendorProductVersion
linuxlinux_kernel
3.11 ≤
𝑥
< 5.10.181
linuxlinux_kernel
5.11 ≤
𝑥
< 5.15.113
linuxlinux_kernel
5.16 ≤
𝑥
< 6.1.30
linuxlinux_kernel
6.2 ≤
𝑥
< 6.3.4
linuxlinux_kernel
6.4:rc1
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
linux
bookworm
6.1.148-1
fixed
bookworm (security)
6.1.153-1
fixed
bullseye
5.10.223-1
fixed
bullseye (security)
5.10.237-1
fixed
forky
6.16.8-1
fixed
sid
6.16.9-1
fixed
trixie
6.12.43-1
fixed
trixie (security)
6.12.48-1
fixed
Red Hat logo
Red Hat Enterprise Linux Releases
Red Hat Product
Release
bpftool
RHEL 9
0:7.4.0-503.11.1.el9_5
fixed
kernel
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-64k
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-64k-core
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-64k-debug
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-64k-debug-core
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-64k-debug-devel
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-64k-debug-devel-matched
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-64k-debug-modules
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-64k-debug-modules-core
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-64k-debug-modules-extra
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-64k-devel
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-64k-devel-matched
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-64k-modules
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-64k-modules-core
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-64k-modules-extra
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-abi-stablelists
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-core
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-debug
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-debug-core
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-debug-devel
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-debug-devel-matched
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-debug-modules
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-debug-modules-core
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-debug-modules-extra
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-debug-uki-virt
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-devel
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-devel-matched
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-doc
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-modules
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-modules-core
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-modules-extra
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-rt
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-rt-core
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-rt-debug
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-rt-debug-core
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-rt-debug-devel
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-rt-debug-kvm
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-rt-debug-modules
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-rt-debug-modules-core
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-rt-debug-modules-extra
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-rt-devel
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-rt-kvm
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-rt-modules
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-rt-modules-core
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-rt-modules-extra
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-tools
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-tools-libs
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-tools-libs-devel
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-uki-virt
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-uki-virt-addons
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-zfcpdump
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-zfcpdump-core
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-zfcpdump-devel
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-zfcpdump-devel-matched
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-zfcpdump-modules
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-zfcpdump-modules-core
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
kernel-zfcpdump-modules-extra
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
libperf
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
perf
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
python3-perf
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
rtla
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed
rv
RHEL 9
0:5.14.0-503.11.1.el9_5
fixed