VYPR
Unrated severityNVD Advisory· Published Dec 24, 2025· Updated Apr 15, 2026

CVE-2023-54132

CVE-2023-54132

Description

In the Linux kernel, the following vulnerability has been resolved:

erofs: stop parsing non-compact HEAD index if clusterofs is invalid

Syzbot generated a crafted image [1] with a non-compact HEAD index of clusterofs 33024 while valid numbers should be 0 ~ lclustersize-1, which causes the following unexpected behavior as below:

BUG: unable to handle page fault for address: fffff52101a3fff9 #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD 23ffed067 P4D 23ffed067 PUD 0 Oops: 0000 [#1] PREEMPT SMP KASAN CPU: 1 PID: 4398 Comm: kworker/u5:1 Not tainted 6.3.0-rc6-syzkaller-g09a9639e56c0 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/30/2023 Workqueue: erofs_worker z_erofs_decompressqueue_work RIP: 0010:z_erofs_decompress_queue+0xb7e/0x2b40 ... Call Trace:

z_erofs_decompressqueue_work+0x99/0xe0 process_one_work+0x8f6/0x1170 worker_thread+0xa63/0x1210 kthread+0x270/0x300 ret_from_fork+0x1f/0x30

Note that normal images or images using compact indexes are not impacted. Let's fix this now.

[1] https://lore.kernel.org/r/000000000000ec75b005ee97fbaa@google.com

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A crafted EROFS image with an invalid clusterofs in a non-compact HEAD index causes a kernel NULL-pointer dereference during decompression.

Vulnerability

Overview

CVE-2023-54132 is a kernel memory safety vulnerability in the EROFS (Enhanced Read-Only File System) implementation. The root cause is the lack of validation for the clusterofs field in non-compact HEAD indexes. A crafted filesystem image can supply an out-of-range value (e.g., 33024 vs. the valid range 0..lclustersize-1), which leads to a page fault when the decompression engine attempts to access memory using this invalid offset [1].

Attack

Vector and Prerequisites

An attacker must be able to mount a malicious EROFS image, typically by tricking a local user or a privileged process into accessing a storage device or loopback file that contains the crafted image. The vulnerability is triggered during the decompression workqueue (z_erofs_decompressqueue_work) when a non-compact index is parsed. No additional authentication or network access is required once the malicious image is mounted. The attack surface is limited to systems where untrusted filesystem images can be introduced, such as sandboxed environments or systems that automatically mount removable media [1].

Impact

A successful exploit causes a kernel panic (BUG: unable to handle page fault) resulting in a denial of service. The log shows an Oops with a non-present page at an address derived from the invalid clusterofs. While the report does not confirm remote code execution, the nature of the out-of-bounds access could, in principle, be leveraged for privilege escalation or arbitrary code execution by an attacker who can carefully control the memory layout [1].

Mitigation

The fix was applied to the Linux kernel stable trees in commits [1], [2], and [3], which add bounds checking for the clusterofs field before it is used. Users should update their kernel to a version that includes these patches. No workaround is available other than avoiding the use of untrusted EROFS images on unpatched systems [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

7

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

7

News mentions

0

No linked articles in our index yet.