CVE-2023-53068

In the Linux kernel, the following vulnerability has been resolved: net: usb: lan78xx: Limit packet length to skb->len Packet length retrieved from descriptor may be larger than the actual socket buffer length. In such case the cloned skb passed up the network stack will leak kernel memory contents. Additionally prevent integer underflow when size is less than ETH_FCS_LEN.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.3:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.3:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.3:rc3:*:*:*:*:*:*

History

12 Nov 2025, 20:51

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/44b9ed73369fc5ec85dd2ee487e986301792a82d - () https://git.kernel.org/stable/c/44b9ed73369fc5ec85dd2ee487e986301792a82d - Patch
References () https://git.kernel.org/stable/c/7f247f5a2c18b3f21206cdd51193df4f38e1b9f5 - () https://git.kernel.org/stable/c/7f247f5a2c18b3f21206cdd51193df4f38e1b9f5 - Patch
References () https://git.kernel.org/stable/c/83de34967473ed31d276381373713cc2869a42e5 - () https://git.kernel.org/stable/c/83de34967473ed31d276381373713cc2869a42e5 - Patch
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.3:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.3:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.3:rc2:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux linux Kernel
Linux
CWE CWE-401

Information

Published : 2025-05-02 16:15

Updated : 2025-11-12 20:51


NVD link : CVE-2023-53068

Mitre link : CVE-2023-53068

CVE.ORG link : CVE-2023-53068


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-401

Missing Release of Memory after Effective Lifetime