{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2023-54130","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2025-12-24T13:02:52.521Z","datePublished":"2025-12-24T13:06:47.502Z","dateUpdated":"2026-05-11T19:56:04.022Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T19:56:04.022Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nhfs/hfsplus: avoid WARN_ON() for sanity check, use proper error handling\n\nCommit 55d1cbbbb29e (\"hfs/hfsplus: use WARN_ON for sanity check\") fixed\na build warning by turning a comment into a WARN_ON(), but it turns out\nthat syzbot then complains because it can trigger said warning with a\ncorrupted hfs image.\n\nThe warning actually does warn about a bad situation, but we are much\nbetter off just handling it as the error it is.  So rather than warn\nabout us doing bad things, stop doing the bad things and return -EIO.\n\nWhile at it, also fix a memory leak that was introduced by an earlier\nfix for a similar syzbot warning situation, and add a check for one case\nthat historically wasn't handled at all (ie neither comment nor\nsubsequent WARN_ON)."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["fs/hfs/inode.c"],"versions":[{"version":"c886c10a6eddb99923b315f42bf63f448883ef9a","lessThan":"cc2164ada548addfa8ee215196661c3afe0c5154","status":"affected","versionType":"git"},{"version":"2344f17c0a89c181ab1a9fef57fd8c3bddfd6e30","lessThan":"82725be426bce0a425cc5e26fbad61ffd29cff03","status":"affected","versionType":"git"},{"version":"90103ccb6e60aa4efe48993d23d6a528472f2233","lessThan":"da23752d9660ba7a8ca6c5768fd8776f67f59ee7","status":"affected","versionType":"git"},{"version":"4fd3a11804c8877ff11fec59c5c53f1635331e3e","lessThan":"be01f35efa876eb81cebab2cb0add068b7280ef4","status":"affected","versionType":"git"},{"version":"48d9e2e6de01ed35e965eb549758a837c07b601d","lessThan":"f10defb0be6ac42fb6a97b45920d32da6bd6fde8","status":"affected","versionType":"git"},{"version":"55d1cbbbb29e6656c662ee8f73ba1fc4777532eb","lessThan":"90e019006644dad35862cb4aa270f561b0732066","status":"affected","versionType":"git"},{"version":"55d1cbbbb29e6656c662ee8f73ba1fc4777532eb","lessThan":"45917be9f0af339a45b4619f31c902d37b8aed59","status":"affected","versionType":"git"},{"version":"55d1cbbbb29e6656c662ee8f73ba1fc4777532eb","lessThan":"cb7a95af78d29442b8294683eca4897544b8ef46","status":"affected","versionType":"git"},{"version":"8c40f2dbae603ef0bd21e87c63f54ec59fd88256","status":"affected","versionType":"git"},{"version":"367296925c7625c3969d2a78d7a3e1dee161beb5","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["fs/hfs/inode.c"],"versions":[{"version":"5.16","status":"affected"},{"version":"0","lessThan":"5.16","status":"unaffected","versionType":"semver"},{"version":"6.0.19","lessThanOrEqual":"6.0.*","status":"unaffected","versionType":"semver"},{"version":"6.1.5","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.2","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.16","versionEndExcluding":"6.0.19"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.16","versionEndExcluding":"6.1.5"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.16","versionEndExcluding":"6.2"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.9.337"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.15.86"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/cc2164ada548addfa8ee215196661c3afe0c5154"},{"url":"https://git.kernel.org/stable/c/82725be426bce0a425cc5e26fbad61ffd29cff03"},{"url":"https://git.kernel.org/stable/c/da23752d9660ba7a8ca6c5768fd8776f67f59ee7"},{"url":"https://git.kernel.org/stable/c/be01f35efa876eb81cebab2cb0add068b7280ef4"},{"url":"https://git.kernel.org/stable/c/f10defb0be6ac42fb6a97b45920d32da6bd6fde8"},{"url":"https://git.kernel.org/stable/c/90e019006644dad35862cb4aa270f561b0732066"},{"url":"https://git.kernel.org/stable/c/45917be9f0af339a45b4619f31c902d37b8aed59"},{"url":"https://git.kernel.org/stable/c/cb7a95af78d29442b8294683eca4897544b8ef46"}],"title":"hfs/hfsplus: avoid WARN_ON() for sanity check, use proper error handling","x_generator":{"engine":"bippy-1.2.0"}}}}