Memory leak in Linux kernel net usb driver



| Updated: 2025-05-10
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2023-53062
CWE-ID CWE-401
Exploitation vector Local
Public exploit N/A
Vulnerable software
Linux kernel
Operating systems & Components / Operating system

Vendor Linux Foundation

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Memory leak

EUVDB-ID: #VU108418

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-53062

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the smsc95xx_rx_fixup() function in drivers/net/usb/smsc95xx.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Linux kernel: 4.14 - 6.3 rc6

CPE2.3 External links

https://git.kernel.org/stable/c/33d1603a38e05886c538129ddfe00bd52d347e7b
https://git.kernel.org/stable/c/70eb25c6a6cde149affe8a587371a3a8ad295ba0
https://git.kernel.org/stable/c/733580e268a53db1cd01f2251419da91866378f6
https://git.kernel.org/stable/c/ba6c40227108f8ee428e42eb0337b48ed3001e65
https://git.kernel.org/stable/c/d3c145a4d24b752c9a1314d5a595014d51471418
https://git.kernel.org/stable/c/e041bef1adee02999cf24f9a2e15ed452bc363fe
https://git.kernel.org/stable/c/f2111c791d885211714db85f9a06188571c57dd0
https://git.kernel.org/stable/c/ff821092cf02a70c2bccd2d19269f01e29aa52cf
https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.312
https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.280
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.177
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.105
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.240
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.22
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.9
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###