CVE-2023-54132
Invalid Cluster Offset in Linux EROFS Causes Kernel Page Fault
Publication date: 2025-12-24
Last updated on: 2025-12-24
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.3.0-rc6 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash (kernel panic) when processing specially crafted erofs images with invalid cluster offsets. This leads to denial of service by making the system unstable or unresponsive. Systems using erofs with non-compact HEAD indexes could be exploited to trigger this behavior.
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's erofs filesystem driver. It involves improper handling of a non-compact HEAD index with an invalid cluster offset (clusterofs). Specifically, when a crafted image contains a non-compact HEAD index with a clusterofs value outside the valid range (0 to lclustersize-1), it causes the kernel to encounter a page fault and crash due to supervisor read access in kernel mode. Normal images or those using compact indexes are not affected.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is resolved by stopping parsing of non-compact HEAD index if clusterofs is invalid in the erofs filesystem code of the Linux kernel. To mitigate this vulnerability, you should update your Linux kernel to a version that includes this fix.