Home

Description

In the Linux kernel, the following vulnerability has been resolved: hfs/hfsplus: avoid WARN_ON() for sanity check, use proper error handling Commit 55d1cbbbb29e ("hfs/hfsplus: use WARN_ON for sanity check") fixed a build warning by turning a comment into a WARN_ON(), but it turns out that syzbot then complains because it can trigger said warning with a corrupted hfs image. The warning actually does warn about a bad situation, but we are much better off just handling it as the error it is. So rather than warn about us doing bad things, stop doing the bad things and return -EIO. While at it, also fix a memory leak that was introduced by an earlier fix for a similar syzbot warning situation, and add a check for one case that historically wasn't handled at all (ie neither comment nor subsequent WARN_ON).

PUBLISHED Reserved 2025-12-24 | Published 2025-12-24 | Updated 2025-12-24 | Assigner Linux

Product status

Default status
unaffected

c886c10a6eddb99923b315f42bf63f448883ef9a (git) before cc2164ada548addfa8ee215196661c3afe0c5154
affected

2344f17c0a89c181ab1a9fef57fd8c3bddfd6e30 (git) before 82725be426bce0a425cc5e26fbad61ffd29cff03
affected

90103ccb6e60aa4efe48993d23d6a528472f2233 (git) before da23752d9660ba7a8ca6c5768fd8776f67f59ee7
affected

4fd3a11804c8877ff11fec59c5c53f1635331e3e (git) before be01f35efa876eb81cebab2cb0add068b7280ef4
affected

48d9e2e6de01ed35e965eb549758a837c07b601d (git) before f10defb0be6ac42fb6a97b45920d32da6bd6fde8
affected

55d1cbbbb29e6656c662ee8f73ba1fc4777532eb (git) before 90e019006644dad35862cb4aa270f561b0732066
affected

55d1cbbbb29e6656c662ee8f73ba1fc4777532eb (git) before 45917be9f0af339a45b4619f31c902d37b8aed59
affected

55d1cbbbb29e6656c662ee8f73ba1fc4777532eb (git) before cb7a95af78d29442b8294683eca4897544b8ef46
affected

8c40f2dbae603ef0bd21e87c63f54ec59fd88256 (git)
affected

367296925c7625c3969d2a78d7a3e1dee161beb5 (git)
affected

Default status
affected

5.16
affected

Any version before 5.16
unaffected

6.0.19 (semver)
unaffected

6.1.5 (semver)
unaffected

6.2 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/cc2164ada548addfa8ee215196661c3afe0c5154

git.kernel.org/...c/82725be426bce0a425cc5e26fbad61ffd29cff03

git.kernel.org/...c/da23752d9660ba7a8ca6c5768fd8776f67f59ee7

git.kernel.org/...c/be01f35efa876eb81cebab2cb0add068b7280ef4

git.kernel.org/...c/f10defb0be6ac42fb6a97b45920d32da6bd6fde8

git.kernel.org/...c/90e019006644dad35862cb4aa270f561b0732066

git.kernel.org/...c/45917be9f0af339a45b4619f31c902d37b8aed59

git.kernel.org/...c/cb7a95af78d29442b8294683eca4897544b8ef46

cve.org (CVE-2023-54130)

nvd.nist.gov (CVE-2023-54130)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.