CVE-2023-53326
BaseFortify
Publication date: 2025-09-16
Last updated on: 2025-12-10
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 4.8 (inc) to 5.10.177 (exc) |
| linux | linux_kernel | From 5.11 (inc) to 5.15.106 (exc) |
| linux | linux_kernel | From 5.16 (inc) to 6.1.23 (exc) |
| linux | linux_kernel | From 6.2 (inc) to 6.2.10 (exc) |
| linux | linux_kernel | 6.3 |
| linux | linux_kernel | 6.3 |
| linux | linux_kernel | 6.3 |
| linux | linux_kernel | 6.3 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-476 | The product dereferences a pointer that it expects to be valid but is NULL. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel on the powerpc architecture. It involves the kernel attempting to copy processor priority registers (PPR) for tasks that have a NULL pt_regs pointer, specifically for PF_IO_WORKER tasks. Since PF_IO_WORKER tasks have NULL pt_regs, when such a task triggers a coredump, the kernel tries to access invalid memory, causing a NULL pointer dereference and a kernel crash.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash when a PF_IO_WORKER task triggers a coredump, leading to system instability or denial of service. It may disrupt normal operations on affected powerpc systems by causing unexpected kernel oops or crashes.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring kernel logs for specific crash messages related to NULL pointer dereferences in the powerpc architecture. Look for kernel oops messages containing lines such as 'Kernel attempted to read user page (160) - exploit attempt?', 'BUG: Kernel NULL pointer dereference on read at 0x00000160', or stack traces involving 'ppr_get'. Commands like 'dmesg | grep -i oops' or 'journalctl -k | grep -i ppr_get' can help identify these crash logs.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves updating the Linux kernel to a version where this vulnerability is fixed. The fix includes checking for a valid pt_regs in ppc_get/ppr_set functions and returning an error if not set, preventing the kernel crash. Until an update is applied, avoid workloads or operations that trigger coredumps on PF_IO_WORKER tasks on powerpc systems.