CVE-2023-54130

Source
https://cve.org/CVERecord?id=CVE-2023-54130
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54130.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-54130
Downstream
Related
Published
2025-12-24T13:06:47.502Z
Modified
2026-03-20T12:33:27.510595Z
Summary
hfs/hfsplus: avoid WARN_ON() for sanity check, use proper error handling
Details

In the Linux kernel, the following vulnerability has been resolved:

hfs/hfsplus: avoid WARN_ON() for sanity check, use proper error handling

Commit 55d1cbbbb29e ("hfs/hfsplus: use WARNON for sanity check") fixed a build warning by turning a comment into a WARNON(), but it turns out that syzbot then complains because it can trigger said warning with a corrupted hfs image.

The warning actually does warn about a bad situation, but we are much better off just handling it as the error it is. So rather than warn about us doing bad things, stop doing the bad things and return -EIO.

While at it, also fix a memory leak that was introduced by an earlier fix for a similar syzbot warning situation, and add a check for one case that historically wasn't handled at all (ie neither comment nor subsequent WARN_ON).

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/54xxx/CVE-2023-54130.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
c886c10a6eddb99923b315f42bf63f448883ef9a
Fixed
cc2164ada548addfa8ee215196661c3afe0c5154
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
2344f17c0a89c181ab1a9fef57fd8c3bddfd6e30
Fixed
82725be426bce0a425cc5e26fbad61ffd29cff03
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
90103ccb6e60aa4efe48993d23d6a528472f2233
Fixed
da23752d9660ba7a8ca6c5768fd8776f67f59ee7
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
4fd3a11804c8877ff11fec59c5c53f1635331e3e
Fixed
be01f35efa876eb81cebab2cb0add068b7280ef4
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
48d9e2e6de01ed35e965eb549758a837c07b601d
Fixed
f10defb0be6ac42fb6a97b45920d32da6bd6fde8
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
55d1cbbbb29e6656c662ee8f73ba1fc4777532eb
Fixed
90e019006644dad35862cb4aa270f561b0732066
Fixed
45917be9f0af339a45b4619f31c902d37b8aed59
Fixed
cb7a95af78d29442b8294683eca4897544b8ef46
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
8c40f2dbae603ef0bd21e87c63f54ec59fd88256
Last affected
367296925c7625c3969d2a78d7a3e1dee161beb5

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54130.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.0.19
Type
ECOSYSTEM
Events
Introduced
6.1.0
Fixed
6.1.5

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54130.json"