First published: Fri May 02 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: net: usb: smsc75xx: Limit packet length to skb->len Packet length retrieved from skb data may be larger than the actual socket buffer length (up to 9026 bytes). In such case the cloned skb passed up the network stack will leak kernel memory contents.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-53125 has been classified as a medium severity vulnerability in the Linux kernel.
To fix CVE-2023-53125, you should update to the latest version of the Linux kernel where the vulnerability has been patched.
CVE-2023-53125 affects the usb subsystem, specifically the smsc75xx driver within the Linux kernel.
CVE-2023-53125 could potentially allow for denial of service attacks due to improper packet length handling.
CVE-2023-53125 is considered to be exploitable by users with access to the affected system, allowing them to manipulate network packets.