SB20250919117 - Improper error handling in Linux kernel packet
Published: September 19, 2025 Updated: September 22, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Improper error handling (CVE-ID: CVE-2023-53433)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper error handling within the packet_parse_headers() function in net/packet/af_packet.c. A local user can perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/15eaeb8941f12fcc2713c4bf6eb8f76a37854b4d
- https://git.kernel.org/stable/c/34a5ee69ec6273f0aee79e7ce4d14afc83ca8122
- https://git.kernel.org/stable/c/4063384ef762cc5946fc7a3f89879e76c6ec51e2
- https://git.kernel.org/stable/c/4188c5269475ac59d467b5814c5df02756f6d907
- https://git.kernel.org/stable/c/55caf900e13cd04466def08173a14b41d18c19c3
- https://git.kernel.org/stable/c/9dd9ffe118415b4ac1cebac43443000072bc8f46
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.113