{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2024-53234","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2024-11-19T17:17:25.026Z","datePublished":"2024-12-27T13:50:20.909Z","dateUpdated":"2025-11-03T20:48:01.055Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2025-05-04T13:00:45.821Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nerofs: handle NONHEAD !delta[1] lclusters gracefully\n\nsyzbot reported a WARNING in iomap_iter_done:\n iomap_fiemap+0x73b/0x9b0 fs/iomap/fiemap.c:80\n ioctl_fiemap fs/ioctl.c:220 [inline]\n\nGenerally, NONHEAD lclusters won't have delta[1]==0, except for crafted\nimages and filesystems created by pre-1.0 mkfs versions.\n\nPreviously, it would immediately bail out if delta[1]==0, which led to\ninadequate decompressed lengths (thus FIEMAP is impacted).  Treat it as\ndelta[1]=1 to work around these legacy mkfs versions.\n\n`lclusterbits > 14` is illegal for compact indexes, error out too."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["fs/erofs/zmap.c"],"versions":[{"version":"d95ae5e25326092d61613acf98280270dde22778","lessThan":"75a0a6dde803e7a3af700da8da9a361b49f69eba","status":"affected","versionType":"git"},{"version":"d95ae5e25326092d61613acf98280270dde22778","lessThan":"f466641debcbea8bdf78d1b63a6270aadf9301bf","status":"affected","versionType":"git"},{"version":"d95ae5e25326092d61613acf98280270dde22778","lessThan":"480c6c7b55aeacac800bc2a0d321ff53273045e5","status":"affected","versionType":"git"},{"version":"d95ae5e25326092d61613acf98280270dde22778","lessThan":"daaf68fef4b2ff97928227630021d37b27a96655","status":"affected","versionType":"git"},{"version":"d95ae5e25326092d61613acf98280270dde22778","lessThan":"0bc8061ffc733a0a246b8689b2d32a3e9204f43c","status":"affected","versionType":"git"},{"version":"96a85becb811ca2ce21a21721f1544d342ae431e","status":"affected","versionType":"git"},{"version":"8c723eef989bc419585237daa467b787ddca5415","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["fs/erofs/zmap.c"],"versions":[{"version":"5.15","status":"affected"},{"version":"0","lessThan":"5.15","status":"unaffected","versionType":"semver"},{"version":"6.1.127","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.6.64","lessThanOrEqual":"6.6.*","status":"unaffected","versionType":"semver"},{"version":"6.11.11","lessThanOrEqual":"6.11.*","status":"unaffected","versionType":"semver"},{"version":"6.12.2","lessThanOrEqual":"6.12.*","status":"unaffected","versionType":"semver"},{"version":"6.13","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.15","versionEndExcluding":"6.1.127"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.15","versionEndExcluding":"6.6.64"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.15","versionEndExcluding":"6.11.11"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.15","versionEndExcluding":"6.12.2"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.15","versionEndExcluding":"6.13"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.4.251"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.10.188"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/75a0a6dde803e7a3af700da8da9a361b49f69eba"},{"url":"https://git.kernel.org/stable/c/f466641debcbea8bdf78d1b63a6270aadf9301bf"},{"url":"https://git.kernel.org/stable/c/480c6c7b55aeacac800bc2a0d321ff53273045e5"},{"url":"https://git.kernel.org/stable/c/daaf68fef4b2ff97928227630021d37b27a96655"},{"url":"https://git.kernel.org/stable/c/0bc8061ffc733a0a246b8689b2d32a3e9204f43c"}],"title":"erofs: handle NONHEAD !delta[1] lclusters gracefully","x_generator":{"engine":"bippy-1.2.0"}},"adp":[{"title":"CVE Program Container","references":[{"url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-11-03T20:48:01.055Z"}}]}}