SB2025121063 - Use-after-free in Linux kernel core
Published: December 10, 2025 Updated: December 12, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Use-after-free (CVE-ID: CVE-2023-53836)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the sk_psock_skb_ingress_self() and sk_psock_backlog() functions in net/core/skmsg.c. A local user can escalate privileges on the system.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/65ad600b9bde68d2d28709943ab00b51ca8f0a1d
- https://git.kernel.org/stable/c/923877254f002ae87d441382bb1096d9e773d56d
- https://git.kernel.org/stable/c/a454d84ee20baf7bd7be90721b9821f73c7d23d9
- https://git.kernel.org/stable/c/e6b5e47adb9166e732cdf7e6e034946e3f89f36d
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.5.4