CVE-2023-53062
Published: May 5, 2025Last modified: May 5, 2025
Description
In the Linux kernel, the following vulnerability has been resolved: net: usb: smsc95xx: Limit packet length to skb->len Packet length retrieved from descriptor may be larger than the actual socket buffer length. In such case the cloned skb passed up the network stack will leak kernel memory contents.
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score | 5.5 |
| Attack Vector | LOCAL |
| Attack complexity | LOW |
| Privileges required | LOW |
| User interaction | NONE |
| Scope | UNCHANGED |
| Confidentiality | NONE |
| Integrity impact | NONE |
| Availability impact | HIGH |
| Vector | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
Status
| Product | Release | Package | Status |
|---|---|---|---|
| Alpaquita Linux | 23 LTS | linux-lts | Not affected (6.1.33-r0) |
| 25 LTS | linux-lts | Not affected (6.6.89-r0) | |
| Stream | linux-lts | Fixed (6.6.58-r0) |
References
- https://git.kernel.org/stable/c/33d1603a38e05886c538129ddfe00bd52d347e7b
- https://git.kernel.org/stable/c/70eb25c6a6cde149affe8a587371a3a8ad295ba0
- https://git.kernel.org/stable/c/733580e268a53db1cd01f2251419da91866378f6
- https://git.kernel.org/stable/c/ba6c40227108f8ee428e42eb0337b48ed3001e65
- https://git.kernel.org/stable/c/d3c145a4d24b752c9a1314d5a595014d51471418
- https://git.kernel.org/stable/c/e041bef1adee02999cf24f9a2e15ed452bc363fe
- https://git.kernel.org/stable/c/f2111c791d885211714db85f9a06188571c57dd0
- https://git.kernel.org/stable/c/ff821092cf02a70c2bccd2d19269f01e29aa52cf