Skip to main content

CVE-2023-53144: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2023-53144cvecve-2023-53144
Published: Fri May 02 2025 (05/02/2025, 15:56:14 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: erofs: fix wrong kunmap when using LZMA on HIGHMEM platforms As the call trace shown, the root cause is kunmap incorrect pages: BUG: kernel NULL pointer dereference, address: 00000000 CPU: 1 PID: 40 Comm: kworker/u5:0 Not tainted 6.2.0-rc5 #4 Workqueue: erofs_worker z_erofs_decompressqueue_work EIP: z_erofs_lzma_decompress+0x34b/0x8ac z_erofs_decompress+0x12/0x14 z_erofs_decompress_queue+0x7e7/0xb1c z_erofs_decompressqueue_work+0x32/0x60 process_one_work+0x24b/0x4d8 ? process_one_work+0x1a4/0x4d8 worker_thread+0x14c/0x3fc kthread+0xe6/0x10c ? rescuer_thread+0x358/0x358 ? kthread_complete_and_exit+0x18/0x18 ret_from_fork+0x1c/0x28 ---[ end trace 0000000000000000 ]--- The bug is trivial and should be fixed now. It has no impact on !HIGHMEM platforms.

AI-Powered Analysis

AILast updated: 07/01/2025, 04:57:32 UTC

Technical Analysis

CVE-2023-53144 is a vulnerability identified in the Linux kernel specifically affecting the erofs (Enhanced Read-Only File System) implementation when using LZMA compression on HIGHMEM platforms. The root cause of the vulnerability is an incorrect use of the kunmap function, which is responsible for unmapping kernel virtual addresses. This incorrect unmapping leads to a NULL pointer dereference, causing a kernel crash (BUG) as evidenced by the kernel panic trace provided. The crash occurs during the decompression process of erofs filesystems using LZMA compression, specifically in the z_erofs_lzma_decompress function. This bug manifests only on HIGHMEM platforms, which are systems with large amounts of memory that require special handling for memory mapping. The vulnerability does not affect non-HIGHMEM platforms. The issue is described as trivial and has been fixed in recent Linux kernel versions. There are no known exploits in the wild, and no CVSS score has been assigned yet. The vulnerability could lead to a denial of service (DoS) condition by crashing the kernel, potentially impacting system availability. Since it involves kernel memory management, exploitation does not require user interaction but does require the system to be running an affected Linux kernel with erofs and LZMA compression enabled on HIGHMEM hardware.

Potential Impact

For European organizations, the primary impact of CVE-2023-53144 is the potential for denial of service due to kernel crashes on affected Linux systems. Organizations using Linux servers or embedded devices with HIGHMEM configurations and erofs filesystems employing LZMA compression could experience unexpected system reboots or downtime. This could disrupt critical services, especially in infrastructure, telecommunications, cloud providers, and data centers that rely on Linux-based systems. While the vulnerability does not lead to privilege escalation or data leakage directly, the availability impact could affect business continuity and operational reliability. Given the Linux kernel's widespread use in European enterprises, government agencies, and industrial control systems, the vulnerability could have a broad impact if unpatched. However, the requirement for HIGHMEM platforms and erofs with LZMA compression narrows the affected scope somewhat. The absence of known exploits reduces immediate risk, but unpatched systems remain vulnerable to accidental or targeted DoS attacks.

Mitigation Recommendations

To mitigate CVE-2023-53144, European organizations should: 1) Identify Linux systems running kernels vulnerable to this issue, focusing on those using erofs with LZMA compression on HIGHMEM platforms. 2) Apply the latest Linux kernel patches or updates that include the fix for this vulnerability as soon as they become available from trusted Linux distributions or kernel maintainers. 3) If patching is not immediately possible, consider disabling erofs or LZMA compression features on HIGHMEM systems as a temporary workaround to prevent triggering the bug. 4) Monitor system logs and kernel crash reports for signs of this specific NULL pointer dereference to detect potential exploitation or accidental triggers. 5) Implement robust system monitoring and automated recovery mechanisms to minimize downtime in case of kernel crashes. 6) For critical infrastructure, conduct thorough testing of kernel updates in staging environments to ensure stability before deployment. 7) Educate system administrators about this vulnerability and the importance of timely patching, especially in environments with HIGHMEM hardware configurations.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-05-02T15:51:43.564Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682d9830c4522896dcbe711c

Added to database: 5/21/2025, 9:09:04 AM

Last enriched: 7/1/2025, 4:57:32 AM

Last updated: 7/30/2025, 11:02:03 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats