CVE-2023-53062

Source
https://cve.org/CVERecord?id=CVE-2023-53062
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53062.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-53062
Downstream
Related
Published
2025-05-02T15:55:16.211Z
Modified
2026-03-20T12:32:56.521199Z
Summary
net: usb: smsc95xx: Limit packet length to skb->len
Details

In the Linux kernel, the following vulnerability has been resolved:

net: usb: smsc95xx: Limit packet length to skb->len

Packet length retrieved from descriptor may be larger than the actual socket buffer length. In such case the cloned skb passed up the network stack will leak kernel memory contents.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53062.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
2f7ca802bdae2ca41022618391c70c2876d92190
Fixed
733580e268a53db1cd01f2251419da91866378f6
Fixed
d3c145a4d24b752c9a1314d5a595014d51471418
Fixed
f2111c791d885211714db85f9a06188571c57dd0
Fixed
33d1603a38e05886c538129ddfe00bd52d347e7b
Fixed
ba6c40227108f8ee428e42eb0337b48ed3001e65
Fixed
e041bef1adee02999cf24f9a2e15ed452bc363fe
Fixed
70eb25c6a6cde149affe8a587371a3a8ad295ba0
Fixed
ff821092cf02a70c2bccd2d19269f01e29aa52cf

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53062.json"