In the Linux kernel, the following vulnerability has been resolved:
net: usb: lan78xx: Limit packet length to skb->len
Packet length retrieved from descriptor may be larger than
the actual socket buffer length. In such case the cloned
skb passed up the network stack will leak kernel memory contents.
Additionally prevent integer underflow when size is less than
ETH_FCS_LEN.
Metrics
Affected Vendors & Products
References
History
Thu, 03 Jul 2025 02:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat
Redhat enterprise Linux |
|
CPEs | cpe:/a:redhat:enterprise_linux:9 cpe:/o:redhat:enterprise_linux:9 |
|
Vendors & Products |
Redhat
Redhat enterprise Linux |
Mon, 05 May 2025 14:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Fri, 02 May 2025 16:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the Linux kernel, the following vulnerability has been resolved: net: usb: lan78xx: Limit packet length to skb->len Packet length retrieved from descriptor may be larger than the actual socket buffer length. In such case the cloned skb passed up the network stack will leak kernel memory contents. Additionally prevent integer underflow when size is less than ETH_FCS_LEN. | |
Title | net: usb: lan78xx: Limit packet length to skb->len | |
References |
|

Status: PUBLISHED
Assigner: Linux
Published: 2025-05-02T15:55:21.142Z
Updated: 2025-05-04T07:49:06.721Z
Reserved: 2025-05-02T15:51:43.548Z
Link: CVE-2023-53068

No data.

Status : Awaiting Analysis
Published: 2025-05-02T16:15:25.870
Modified: 2025-05-05T20:54:45.973
Link: CVE-2023-53068
