Skip to main content

CVE-2023-52526: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2023-52526cvecve-2023-52526
Published: Sat Mar 02 2024 (03/02/2024, 21:52:32 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: erofs: fix memory leak of LZMA global compressed deduplication When stressing microLZMA EROFS images with the new global compressed deduplication feature enabled (`-Ededupe`), I found some short-lived temporary pages weren't properly released, which could slowly cause unexpected OOMs hours later. Let's fix it now (LZ4 and DEFLATE don't have this issue.)

AI-Powered Analysis

AILast updated: 07/01/2025, 10:12:04 UTC

Technical Analysis

CVE-2023-52526 is a vulnerability identified in the Linux kernel's implementation of the EROFS (Enhanced Read-Only File System) feature, specifically related to the microLZMA compression algorithm with the global compressed deduplication feature enabled (activated via the '-Ededupe' option). The issue involves a memory leak caused by the improper release of short-lived temporary pages during the decompression and deduplication process. This flaw leads to a gradual consumption of system memory, which can eventually trigger unexpected out-of-memory (OOM) conditions after prolonged system operation under stress conditions. Notably, this memory leak is specific to the LZMA compression method within EROFS and does not affect other compression algorithms such as LZ4 or DEFLATE. The vulnerability was discovered during stress testing of EROFS images using the microLZMA compression with deduplication enabled. The Linux kernel versions affected include those around the commit hash 5c2a64252c5dc4cfe78e5b2a531c118894e3d155. The issue has been publicly disclosed and patched, although no known exploits are currently reported in the wild. Since this vulnerability pertains to a memory leak rather than a direct code execution or privilege escalation flaw, exploitation would primarily result in resource exhaustion rather than immediate compromise of confidentiality or integrity.

Potential Impact

For European organizations, the impact of CVE-2023-52526 centers on system stability and availability. Systems running Linux kernels with the affected EROFS microLZMA deduplication feature enabled may experience gradual memory depletion leading to unexpected OOM events. This can cause service interruptions, degraded performance, or crashes in critical infrastructure, especially in environments where EROFS is used for read-only file systems with LZMA compression and deduplication enabled. Such environments might include embedded systems, network appliances, or specialized storage solutions. While the vulnerability does not directly expose data or allow unauthorized access, the resulting denial-of-service conditions could disrupt business operations, particularly in sectors relying heavily on Linux-based systems such as telecommunications, cloud service providers, and industrial control systems. The absence of known exploits reduces immediate risk, but unpatched systems remain vulnerable to stability issues under heavy load or prolonged operation.

Mitigation Recommendations

To mitigate CVE-2023-52526, European organizations should: 1) Apply the latest Linux kernel patches that address the memory leak in the EROFS microLZMA global compressed deduplication feature as soon as possible. 2) If patching is not immediately feasible, consider disabling the global compressed deduplication feature ('-Ededupe') for microLZMA compressed EROFS images to prevent the memory leak from occurring. 3) Monitor system memory usage closely on affected systems, especially those utilizing EROFS with LZMA compression, to detect early signs of memory exhaustion. 4) Conduct thorough testing of EROFS configurations in staging environments to identify potential memory leaks under load before deployment. 5) Review and update operational procedures to include kernel version checks and configuration audits for EROFS usage. 6) Engage with Linux distribution vendors and maintain awareness of updates related to EROFS and compression features to ensure timely patching.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-02-20T12:30:33.318Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9831c4522896dcbe7c48

Added to database: 5/21/2025, 9:09:05 AM

Last enriched: 7/1/2025, 10:12:04 AM

Last updated: 8/17/2025, 11:47:58 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats