SB20251226301 - Stack-based buffer overflow in Linux kernel net
Published: December 26, 2025 Updated: December 31, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Stack-based buffer overflow (CVE-ID: CVE-2023-54012)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to stack overflow within the include/net/bonding.h. A local user can perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/4bb955c4d2830a58c08e2a48ab75d75368e3ff36
- https://git.kernel.org/stable/c/6bf00bb3dc7e5b9fb05488e11616e65d64e975fa
- https://git.kernel.org/stable/c/9ea0c5f90a27b5b884d880e146e0f65f3052e401
- https://git.kernel.org/stable/c/ae9b15fbe63447bc1d3bba3769f409d17ca6fdf6
- https://git.kernel.org/stable/c/cf3b5cd7127cc10c5b12400c545f263f0e5e715c
- https://git.kernel.org/stable/c/ed66e6327a69fec95034cda2ac5b6a57b8b3b622
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.31