Executive Summary



This vulnerability is currently undergoing analysis and not all information is available. Please check back soon to view the completed vulnerability summary
Informations
Name CVE-2023-53062 First vendor Publication 2025-05-02
Vendor Cve Last vendor Modification 2025-05-02

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

net: usb: smsc95xx: Limit packet length to skb->len

Packet length retrieved from descriptor may be larger than the actual socket buffer length. In such case the cloned skb passed up the network stack will leak kernel memory contents.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53062

Sources (Detail)

https://git.kernel.org/stable/c/33d1603a38e05886c538129ddfe00bd52d347e7b
https://git.kernel.org/stable/c/70eb25c6a6cde149affe8a587371a3a8ad295ba0
https://git.kernel.org/stable/c/733580e268a53db1cd01f2251419da91866378f6
https://git.kernel.org/stable/c/ba6c40227108f8ee428e42eb0337b48ed3001e65
https://git.kernel.org/stable/c/d3c145a4d24b752c9a1314d5a595014d51471418
https://git.kernel.org/stable/c/e041bef1adee02999cf24f9a2e15ed452bc363fe
https://git.kernel.org/stable/c/f2111c791d885211714db85f9a06188571c57dd0
https://git.kernel.org/stable/c/ff821092cf02a70c2bccd2d19269f01e29aa52cf
Source Url

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2025-05-27 02:29:51
  • First insertion