CVE-2023-53487
BaseFortify
Publication date: 2025-10-01
Last updated on: 2025-10-02
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.5.0-rc3 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's powerpc/rtas_flash component when hardened usercopy is enabled. It involves the /proc/powerpc/rtas/firmware_update interface used for system firmware updates. The issue arises because blocks of the firmware image are copied directly from user memory to objects allocated from flash_block_cache without proper safety markings. This leads to a kernel BUG and an exception in kernel mode, potentially causing system instability or crashes. The root cause is that flash_block_cache was not created using kmem_cache_create_usercopy(), which is necessary to mark it safe for user access.
How can this vulnerability impact me? :
This vulnerability can cause a kernel BUG and an exception in kernel mode, leading to system crashes or instability during firmware updates via the /proc/powerpc/rtas/firmware_update interface. This could disrupt normal system operations, potentially causing downtime or requiring system reboots.