Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2023-53062 |
CWE-ID | CWE-401 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
Linux kernel Operating systems & Components / Operating system |
Vendor | Linux Foundation |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU108418
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-53062
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the smsc95xx_rx_fixup() function in drivers/net/usb/smsc95xx.c. A local user can perform a denial of service (DoS) attack.
MitigationInstall update from vendor's website.
Vulnerable software versionsLinux kernel: 4.14 - 6.3 rc6
CPE2.3https://git.kernel.org/stable/c/33d1603a38e05886c538129ddfe00bd52d347e7b
https://git.kernel.org/stable/c/70eb25c6a6cde149affe8a587371a3a8ad295ba0
https://git.kernel.org/stable/c/733580e268a53db1cd01f2251419da91866378f6
https://git.kernel.org/stable/c/ba6c40227108f8ee428e42eb0337b48ed3001e65
https://git.kernel.org/stable/c/d3c145a4d24b752c9a1314d5a595014d51471418
https://git.kernel.org/stable/c/e041bef1adee02999cf24f9a2e15ed452bc363fe
https://git.kernel.org/stable/c/f2111c791d885211714db85f9a06188571c57dd0
https://git.kernel.org/stable/c/ff821092cf02a70c2bccd2d19269f01e29aa52cf
https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.312
https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.280
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10.177
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.105
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.240
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.22
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.9
https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.