SB20250919128 - Buffer overflow in Linux kernel sctp
Published: September 19, 2025 Updated: September 22, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Buffer overflow (CVE-ID: CVE-2023-53372)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the sctp_generate_iftsn() function in net/sctp/stream_interleave.c. A local user can perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/32832a2caf82663870126c5186cf8f86c8b2a649
- https://git.kernel.org/stable/c/4fbd094d4131a10d06a45d64158567052a35b3f4
- https://git.kernel.org/stable/c/5c9367ac5a22d71841bcd00130f9146c9b227d57
- https://git.kernel.org/stable/c/6109f5b13ce3e3e537db6f18976ec0e9118d1c6f
- https://git.kernel.org/stable/c/79b28f42214a3d0d6a8c514db3602260bd5d6cb5
- https://git.kernel.org/stable/c/ad831a7079c99c01e801764b53bc9997c2e9c0f7
- https://git.kernel.org/stable/c/ad988e9b5ff04607e624a459209e8c2d0c15fc73
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.12