SB2025100899 - Improper locking in Linux kernel trace
Published: October 8, 2025 Updated: October 26, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Improper locking (CVE-ID: CVE-2023-53668)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper locking within the ring_buffer_size() function in kernel/trace/ring_buffer.c. A local user can perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/0a29dae5786d263016a9aceb1e56bf3fd4cc6fa0
- https://git.kernel.org/stable/c/27bdd93e44cc28dd9b94893fae146b83d4f5b31e
- https://git.kernel.org/stable/c/5e68f1f3a20fe9b6bde018e353269fbfa289609c
- https://git.kernel.org/stable/c/7e42907f3a7b4ce3a2d1757f6d78336984daf8f5
- https://git.kernel.org/stable/c/8b0b63fdac6b70a45614e7d4b30e5bbb93deb007
- https://git.kernel.org/stable/c/a55e8a3596048c2f7b574049aeb1885b5abba1cc
- https://git.kernel.org/stable/c/bb14a93bccc92766b1d9302c6bcbea17d4bce306
- https://git.kernel.org/stable/c/e84829522fc72bb43556b31575731de0440ac0dd
- https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.251