SB2025121006 - Reachable assertion in Linux kernel soc
Published: December 10, 2025 Updated: December 12, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Reachable assertion (CVE-ID: CVE-2023-53866)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to reachable assertion within the soc_compr_open_fe(), soc_compr_free_fe() and soc_compr_set_params_fe() functions in sound/soc/soc-compress.c. A local user can perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/37a3eb6054d17676ce2a0bb5dd1fbf7733ecfa7d
- https://git.kernel.org/stable/c/9576b7ccc20365d27c26c494651c89360a85bbdc
- https://git.kernel.org/stable/c/9a9942cbdb7c3f41452f7bc4a9ff9f0b45eb3651
- https://git.kernel.org/stable/c/aa9ff6a4955fdba02b54fbc4386db876603703b7
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.99
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.16
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.3
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3