CVE-2023-54132

Source
https://cve.org/CVERecord?id=CVE-2023-54132
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-54132.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-54132
Downstream
Related
Published
2025-12-24T13:06:49.030Z
Modified
2026-04-02T09:45:37.329426Z
Summary
erofs: stop parsing non-compact HEAD index if clusterofs is invalid
Details

In the Linux kernel, the following vulnerability has been resolved:

erofs: stop parsing non-compact HEAD index if clusterofs is invalid

Syzbot generated a crafted image [1] with a non-compact HEAD index of clusterofs 33024 while valid numbers should be 0 ~ lclustersize-1, which causes the following unexpected behavior as below:

BUG: unable to handle page fault for address: fffff52101a3fff9 #PF: supervisor read access in kernel mode #PF: errorcode(0x0000) - not-present page PGD 23ffed067 P4D 23ffed067 PUD 0 Oops: 0000 [#1] PREEMPT SMP KASAN CPU: 1 PID: 4398 Comm: kworker/u5:1 Not tainted 6.3.0-rc6-syzkaller-g09a9639e56c0 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/30/2023 Workqueue: erofsworker zerofsdecompressqueuework RIP: 0010:zerofsdecompressqueue+0xb7e/0x2b40 ... Call Trace: <TASK> zerofsdecompressqueuework+0x99/0xe0 processonework+0x8f6/0x1170 workerthread+0xa63/0x1210 kthread+0x270/0x300 retfromfork+0x1f/0x30

Note that normal images or images using compact indexes are not impacted. Let's fix this now.

[1] https://lore.kernel.org/r/000000000000ec75b005ee97fbaa@google.com

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/54xxx/CVE-2023-54132.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
02827e1796b33f1794966f5c3101f8da2dfa9c1d
Fixed
880c79bdb002b9d5b6940e52c2ad3829c2178207
Fixed
7a4579cd6e4936de107c82499c3c9ee11b63401e
Fixed
060fecf1114ff9fcfe87953fe8c4fc5048777160
Fixed
7ee7a86e28ce9ead7112286c388df8d254c373c6
Fixed
f01b2894928affa3339d355608713cf3db8360b8
Fixed
96a845419b3722869f09883319de4d55c44d9aef
Fixed
cc4efd3dd2ac9f89143e5d881609747ecff04164

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-54132.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.19.0
Fixed
5.4.243
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.180
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.111
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.28
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.2.15
Type
ECOSYSTEM
Events
Introduced
6.3.0
Fixed
6.3.2

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-54132.json"