Executive Summary



This vulnerability is currently undergoing analysis and not all information is available. Please check back soon to view the completed vulnerability summary
Informations
Name CVE-2023-53125 First vendor Publication 2025-05-02
Vendor Cve Last vendor Modification 2025-05-02

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

net: usb: smsc75xx: Limit packet length to skb->len

Packet length retrieved from skb data may be larger than the actual socket buffer length (up to 9026 bytes). In such case the cloned skb passed up the network stack will leak kernel memory contents.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53125

Sources (Detail)

https://git.kernel.org/stable/c/105db6574281e1e03fcbf87983f4fee111682306
https://git.kernel.org/stable/c/4a4de0a68b18485c68ab4f0cfa665b1633c6d277
https://git.kernel.org/stable/c/53966d572d056d6b234cfe76a5f9d60049d3c178
https://git.kernel.org/stable/c/8ee5df9c039e37b9d8eb5e3de08bfb7f53d31cb6
https://git.kernel.org/stable/c/9fabdd79051a9fe51388df099aff6e4b660fedd2
https://git.kernel.org/stable/c/c7bdc137ca163b90917c1eeba4f1937684bd4f8b
https://git.kernel.org/stable/c/d8b228318935044dafe3a5bc07ee71a1f1424b8d
https://git.kernel.org/stable/c/e294f0aa47e4844f3d3c8766c02accd5a76a7d4e
Source Url

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2025-05-27 02:29:52
  • First insertion