#VU119785 Buffer overflow in Linux kernel - CVE-2023-53863
Published: December 10, 2025 / Updated: December 12, 2025
Vulnerability identifier: #VU119785
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2023-53863
CWE-ID: CWE-119
Exploitation vector: Local access
Exploit availability:
No public exploit available
Vulnerable software:
Linux kernel
Linux kernel
Software vendor:
Linux Foundation
Linux Foundation
Description
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the nlmsg_populate_fdb_fill() and rtnl_fdb_notify() functions in net/core/rtnetlink.c. A local user can perform a denial of service (DoS) attack.
Remediation
Install update from vendor's repository.
External links
- https://git.kernel.org/stable/c/44db85c6e1a184b99a2cdf56b525ac63c4962c22
- https://git.kernel.org/stable/c/619384319b137908d1008c92426c9daa95c06b90
- https://git.kernel.org/stable/c/61d1bf3c34bf5fe936c50d1a4bc460babcc85e88
- https://git.kernel.org/stable/c/73862118bd9dec850aa8e775145647ddd23aedf8
- https://git.kernel.org/stable/c/aa5406950726e336c5c9585b09799a734b6e77bf
- https://git.kernel.org/stable/c/b6f2d4618fc697886ad41e215ae20638153e42d0
- https://git.kernel.org/stable/c/bd1de6107f10e7d4c2aabe3397b58d63672fc511
- https://git.kernel.org/stable/c/c3ad49ff5c030cbe719fc4cb0ae081b8255ef4b3
- https://git.kernel.org/stable/c/e9331c8fa4c69f09d2c71682af75586f77266e81
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.39