{"uuid": "7436770f-b95f-42f4-beb8-94ce89484f17", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-53144", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/14508", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-53144\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nerofs: fix wrong kunmap when using LZMA on HIGHMEM platforms\n\nAs the call trace shown, the root cause is kunmap incorrect pages:\n\n BUG: kernel NULL pointer dereference, address: 00000000\n CPU: 1 PID: 40 Comm: kworker/u5:0 Not tainted 6.2.0-rc5 #4\n Workqueue: erofs_worker z_erofs_decompressqueue_work\n EIP: z_erofs_lzma_decompress+0x34b/0x8ac\n  z_erofs_decompress+0x12/0x14\n  z_erofs_decompress_queue+0x7e7/0xb1c\n  z_erofs_decompressqueue_work+0x32/0x60\n  process_one_work+0x24b/0x4d8\n  ? process_one_work+0x1a4/0x4d8\n  worker_thread+0x14c/0x3fc\n  kthread+0xe6/0x10c\n  ? rescuer_thread+0x358/0x358\n  ? kthread_complete_and_exit+0x18/0x18\n  ret_from_fork+0x1c/0x28\n ---[ end trace 0000000000000000 ]---\n\nThe bug is trivial and should be fixed now.  It has no impact on\n!HIGHMEM platforms.\n\ud83d\udccf Published: 2025-05-02T15:56:14.417Z\n\ud83d\udccf Modified: 2025-05-02T15:56:14.417Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/fa4056781ac067b5946c6811459e1a36842047fd\n2. https://git.kernel.org/stable/c/28aea8ae6cf212a5bf3ed962b27921e2029ad754\n3. https://git.kernel.org/stable/c/8f121dfb15f7b4ab345992ce96003eb63fd608f4", "creation_timestamp": "2025-05-02T16:16:03.000000Z"}