SB20251008123 - Stack-based buffer overflow in Linux kernel rcu
Published: October 8, 2025 Updated: October 26, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Stack-based buffer overflow (CVE-ID: CVE-2023-53655)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to stack overflow within the __rcu_irq_enter_check_tick() function in kernel/rcu/tree.c. A local user can perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/4c3d1a6720aefb02403ddfebe85db521d3af2c3b
- https://git.kernel.org/stable/c/7a29fb4a4771124bc61de397dbfc1554dbbcc19c
- https://git.kernel.org/stable/c/7b5a97333e920b69356e097f185bdc51d61e66ee
- https://git.kernel.org/stable/c/93b6295f677d96b73cfcb703532f6c7369a60d96
- https://git.kernel.org/stable/c/c8a3341b339285495cf7c8d061d659465f2311e0
- https://git.kernel.org/stable/c/eb18bc5a8678f431c500e6da1b8b5f34478d5bc1
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.180