{"id":"CVE-2023-54130","summary":"hfs/hfsplus: avoid WARN_ON() for sanity check, use proper error handling","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nhfs/hfsplus: avoid WARN_ON() for sanity check, use proper error handling\n\nCommit 55d1cbbbb29e (\"hfs/hfsplus: use WARN_ON for sanity check\") fixed\na build warning by turning a comment into a WARN_ON(), but it turns out\nthat syzbot then complains because it can trigger said warning with a\ncorrupted hfs image.\n\nThe warning actually does warn about a bad situation, but we are much\nbetter off just handling it as the error it is.  So rather than warn\nabout us doing bad things, stop doing the bad things and return -EIO.\n\nWhile at it, also fix a memory leak that was introduced by an earlier\nfix for a similar syzbot warning situation, and add a check for one case\nthat historically wasn't handled at all (ie neither comment nor\nsubsequent WARN_ON).","modified":"2026-03-20T12:33:27.510595Z","published":"2025-12-24T13:06:47.502Z","related":["SUSE-SU-2026:0263-1","SUSE-SU-2026:0316-1","SUSE-SU-2026:0317-1","SUSE-SU-2026:0411-1","SUSE-SU-2026:0617-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/54xxx/CVE-2023-54130.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/45917be9f0af339a45b4619f31c902d37b8aed59"},{"type":"WEB","url":"https://git.kernel.org/stable/c/82725be426bce0a425cc5e26fbad61ffd29cff03"},{"type":"WEB","url":"https://git.kernel.org/stable/c/90e019006644dad35862cb4aa270f561b0732066"},{"type":"WEB","url":"https://git.kernel.org/stable/c/be01f35efa876eb81cebab2cb0add068b7280ef4"},{"type":"WEB","url":"https://git.kernel.org/stable/c/cb7a95af78d29442b8294683eca4897544b8ef46"},{"type":"WEB","url":"https://git.kernel.org/stable/c/cc2164ada548addfa8ee215196661c3afe0c5154"},{"type":"WEB","url":"https://git.kernel.org/stable/c/da23752d9660ba7a8ca6c5768fd8776f67f59ee7"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f10defb0be6ac42fb6a97b45920d32da6bd6fde8"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/54xxx/CVE-2023-54130.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54130"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"c886c10a6eddb99923b315f42bf63f448883ef9a"},{"fixed":"cc2164ada548addfa8ee215196661c3afe0c5154"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"2344f17c0a89c181ab1a9fef57fd8c3bddfd6e30"},{"fixed":"82725be426bce0a425cc5e26fbad61ffd29cff03"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"90103ccb6e60aa4efe48993d23d6a528472f2233"},{"fixed":"da23752d9660ba7a8ca6c5768fd8776f67f59ee7"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"4fd3a11804c8877ff11fec59c5c53f1635331e3e"},{"fixed":"be01f35efa876eb81cebab2cb0add068b7280ef4"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"48d9e2e6de01ed35e965eb549758a837c07b601d"},{"fixed":"f10defb0be6ac42fb6a97b45920d32da6bd6fde8"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"55d1cbbbb29e6656c662ee8f73ba1fc4777532eb"},{"fixed":"90e019006644dad35862cb4aa270f561b0732066"},{"fixed":"45917be9f0af339a45b4619f31c902d37b8aed59"},{"fixed":"cb7a95af78d29442b8294683eca4897544b8ef46"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"0"},{"last_affected":"8c40f2dbae603ef0bd21e87c63f54ec59fd88256"},{"last_affected":"367296925c7625c3969d2a78d7a3e1dee161beb5"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54130.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.0.19"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.1.0"},{"fixed":"6.1.5"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54130.json"}}],"schema_version":"1.7.5"}