VYPR
Unrated severityNVD Advisory· Published Dec 24, 2025· Updated Apr 15, 2026

CVE-2023-54130

CVE-2023-54130

Description

In the Linux kernel, the following vulnerability has been resolved:

hfs/hfsplus: avoid WARN_ON() for sanity check, use proper error handling

Commit 55d1cbbbb29e ("hfs/hfsplus: use WARN_ON for sanity check") fixed a build warning by turning a comment into a WARN_ON(), but it turns out that syzbot then complains because it can trigger said warning with a corrupted hfs image.

The warning actually does warn about a bad situation, but we are much better off just handling it as the error it is. So rather than warn about us doing bad things, stop doing the bad things and return -EIO.

While at it, also fix a memory leak that was introduced by an earlier fix for a similar syzbot warning situation, and add a check for one case that historically wasn't handled at all (ie neither comment nor subsequent WARN_ON).

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A corrupted HFS/HFS+ filesystem image can trigger a WARN_ON() in the Linux kernel; the fix replaces it with proper error handling to avoid a crash.

Vulnerability in the

Linux kernel's HFS and HFS+ filesystem drivers. A previous commit (55d1cbbbb29e) replaced a comment with a WARN_ON() for a sanity check, but this can be triggered by a corrupted filesystem image, causing a kernel warning. The fix replaces the WARN_ON() with proper error handling, returning -EIO instead of crashing the system. Additionally, the fix addresses a memory leak introduced by an earlier fix for a similar syzbot report and adds a check for a case that was previously unhandled [1][2][3].

Exploitation

An attacker can exploit this vulnerability by mounting a specially crafted HFS or HFS+ filesystem image. No special privileges are required beyond the ability to mount a filesystem (e.g., via a USB drive or network filesystem). The attack surface is local, requiring the attacker to have access to the system to mount the malicious image. The vulnerability is triggered during the mount process when the kernel parses the corrupted filesystem structures [1][2].

Impact

Successful exploitation causes a kernel WARN_ON() splat, which can lead to a denial of service (system crash or hang) or potentially be used to bypass security mechanisms. The warning itself does not directly allow arbitrary code execution, but it can be used to disrupt system availability. The fix prevents this by handling the error gracefully [1][2][3].

Mitigation

The vulnerability is fixed in the Linux kernel by commit 82725be426bce0a425cc5e26fbad61ffd29cff03, 45917be9f0af339a45b4619f31c902d37b8aed59, and da23752d9660ba7a8ca6c5768fd8776f67f59ee7. Users should update to a kernel version containing these commits. No workaround is available other than avoiding mounting untrusted HFS/HFS+ images [1][2][3].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

8

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

8

News mentions

0

No linked articles in our index yet.