SB20251210158 - Buffer overflow in Linux kernel core
Published: December 10, 2025 Updated: December 12, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Buffer overflow (CVE-ID: CVE-2023-53863)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the nlmsg_populate_fdb_fill() and rtnl_fdb_notify() functions in net/core/rtnetlink.c. A local user can perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/44db85c6e1a184b99a2cdf56b525ac63c4962c22
- https://git.kernel.org/stable/c/619384319b137908d1008c92426c9daa95c06b90
- https://git.kernel.org/stable/c/61d1bf3c34bf5fe936c50d1a4bc460babcc85e88
- https://git.kernel.org/stable/c/73862118bd9dec850aa8e775145647ddd23aedf8
- https://git.kernel.org/stable/c/aa5406950726e336c5c9585b09799a734b6e77bf
- https://git.kernel.org/stable/c/b6f2d4618fc697886ad41e215ae20638153e42d0
- https://git.kernel.org/stable/c/bd1de6107f10e7d4c2aabe3397b58d63672fc511
- https://git.kernel.org/stable/c/c3ad49ff5c030cbe719fc4cb0ae081b8255ef4b3
- https://git.kernel.org/stable/c/e9331c8fa4c69f09d2c71682af75586f77266e81
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.39