CVE-2023-53487Incorrect Default Permissions in Linux

Severity
7.8HIGHNVD
EPSS
0.0%
top 96.97%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 1

Description

In the Linux kernel, the following vulnerability has been resolved: powerpc/rtas_flash: allow user copy to flash block cache objects With hardened usercopy enabled (CONFIG_HARDENED_USERCOPY=y), using the /proc/powerpc/rtas/firmware_update interface to prepare a system firmware update yields a BUG(): kernel BUG at mm/usercopy.c:102! Oops: Exception in kernel mode, sig: 5 [#1] LE PAGE_SIZE=64K MMU=Hash SMP NR_CPUS=2048 NUMA pSeries Modules linked in: CPU: 0 PID: 2232 Comm: dd Not tainted 6.5.0-

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages4 packages

NVDlinux/linux_kernel4.164.19.293+6
Debianlinux/linux_kernel< 5.10.197-1+3
CVEListV5linux/linux6d07d1cd300f4c7e16005f881fea388164999cc88f09cc15dcd91d16562400c51d24c7be0d5796fa+7
debiandebian/linux< linux 6.1.52-1 (bookworm)

Patches

🔴Vulnerability Details

2
GHSA
GHSA-hpjg-565w-prfp: In the Linux kernel, the following vulnerability has been resolved: powerpc/rtas_flash: allow user copy to flash block cache objects With hardened u2025-10-01
OSV
CVE-2023-53487: In the Linux kernel, the following vulnerability has been resolved: powerpc/rtas_flash: allow user copy to flash block cache objects With hardened use2025-10-01

📋Vendor Advisories

2
Red Hat
kernel: powerpc/rtas_flash: allow user copy to flash block cache objects2025-10-01
Debian
CVE-2023-53487: linux - In the Linux kernel, the following vulnerability has been resolved: powerpc/rta...2023