In the Linux kernel, the following vulnerability has been resolved:
net: usb: smsc95xx: Limit packet length to skb->len
Packet length retrieved from descriptor may be larger than
the actual socket buffer length. In such case the cloned
skb passed up the network stack will leak kernel memory contents.
Metrics
Affected Vendors & Products
References
History
Sat, 07 Jun 2025 03:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Mon, 05 May 2025 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Fri, 02 May 2025 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In the Linux kernel, the following vulnerability has been resolved: net: usb: smsc95xx: Limit packet length to skb->len Packet length retrieved from descriptor may be larger than the actual socket buffer length. In such case the cloned skb passed up the network stack will leak kernel memory contents. | |
| Title | net: usb: smsc95xx: Limit packet length to skb->len | |
| References |
|
|
Status: PUBLISHED
Assigner: Linux
Published: 2025-05-02T15:55:16.211Z
Updated: 2025-05-04T07:48:59.615Z
Reserved: 2025-05-02T15:51:43.547Z
Link: CVE-2023-53062
No data.
Status : Awaiting Analysis
Published: 2025-05-02T16:15:25.257
Modified: 2025-05-05T20:54:45.973
Link: CVE-2023-53062