#VU115945 Buffer overflow in Linux kernel - CVE-2023-53400
Published: September 19, 2025 / Updated: September 22, 2025
Vulnerability identifier: #VU115945
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2023-53400
CWE-ID: CWE-119
Exploitation vector: Local access
Exploit availability:
No public exploit available
Vulnerable software:
Linux kernel
Linux kernel
Software vendor:
Linux Foundation
Linux Foundation
Description
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory corruption within the path_has_mixer() and get_line_out_pfx() functions in sound/pci/hda/hda_generic.c. A local user can perform a denial of service (DoS) attack.
Remediation
Install update from vendor's repository.
External links
- https://git.kernel.org/stable/c/082dcd51667b29097500c824c37f24da997a6a8a
- https://git.kernel.org/stable/c/3b44ec8c5c44790a82f07e90db45643c762878c6
- https://git.kernel.org/stable/c/4ef155ddf9578bf035964d58739fdcd7dd44b4a4
- https://git.kernel.org/stable/c/546b1f5f45a355ae0d3a8041cdaca597dfcac825
- https://git.kernel.org/stable/c/b5694aae4c2d9a288bafce7d38f122769e0428e6
- https://git.kernel.org/stable/c/dc8c569d59f17b17d7bca4f68c36bd571659921e
- https://git.kernel.org/stable/c/e8c7d7c43d5edd20e518fe1dfb2371d1fe6e8bb8
- https://git.kernel.org/stable/c/fcf637461019e9a5a0c12fc5c42a9db1779b0634
- https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.4