vulnerability
Ubuntu: (CVE-2023-52655): linux vulnerability
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:L/AC:L/Au:S/C:N/I:N/A:C) | May 14, 2024 | Nov 19, 2024 | Sep 19, 2025 |
Severity
5
CVSS
(AV:L/AC:L/Au:S/C:N/I:N/A:C)
Published
May 14, 2024
Added
Nov 19, 2024
Modified
Sep 19, 2025
Description
In the Linux kernel, the following vulnerability has been resolved:
usb: aqc111: check packet for fixup for true limit
If a device sends a packet that is inbetween 0
and sizeof(u64) the value passed to skb_trim()
as length will wrap around ending up as some very
large value.
The driver will then proceed to parse the header
located at that position, which will either oops or
process some random value.
The fix is to check against sizeof(u64) rather than
0, which the driver currently does. The issue exists
since the introduction of the driver.
Solutions
ubuntu-upgrade-linuxubuntu-upgrade-linux-awsubuntu-upgrade-linux-aws-5-15ubuntu-upgrade-linux-aws-5-4ubuntu-upgrade-linux-aws-fipsubuntu-upgrade-linux-azureubuntu-upgrade-linux-azure-5-15ubuntu-upgrade-linux-azure-5-4ubuntu-upgrade-linux-azure-fdeubuntu-upgrade-linux-azure-fipsubuntu-upgrade-linux-bluefieldubuntu-upgrade-linux-fipsubuntu-upgrade-linux-gcpubuntu-upgrade-linux-gcp-5-15ubuntu-upgrade-linux-gcp-5-4ubuntu-upgrade-linux-gcp-fipsubuntu-upgrade-linux-gkeubuntu-upgrade-linux-gkeopubuntu-upgrade-linux-gkeop-5-15ubuntu-upgrade-linux-hwe-5-15ubuntu-upgrade-linux-hwe-5-4ubuntu-upgrade-linux-ibmubuntu-upgrade-linux-ibm-5-15ubuntu-upgrade-linux-ibm-5-4ubuntu-upgrade-linux-intel-iot-realtimeubuntu-upgrade-linux-intel-iotgubuntu-upgrade-linux-intel-iotg-5-15ubuntu-upgrade-linux-iotubuntu-upgrade-linux-kvmubuntu-upgrade-linux-lowlatencyubuntu-upgrade-linux-lowlatency-hwe-5-15ubuntu-upgrade-linux-nvidiaubuntu-upgrade-linux-nvidia-6-5ubuntu-upgrade-linux-nvidia-tegraubuntu-upgrade-linux-nvidia-tegra-5-15ubuntu-upgrade-linux-nvidia-tegra-igxubuntu-upgrade-linux-oracleubuntu-upgrade-linux-oracle-5-15ubuntu-upgrade-linux-oracle-5-4ubuntu-upgrade-linux-raspiubuntu-upgrade-linux-raspi-5-4ubuntu-upgrade-linux-realtimeubuntu-upgrade-linux-riscv-5-15ubuntu-upgrade-linux-xilinx-zynqmp
References
- CVE-2023-52655
- https://attackerkb.com/topics/CVE-2023-52655
- URL-https://git.kernel.org/linus/ccab434e674ca95d483788b1895a70c21b7f016a
- URL-https://git.kernel.org/stable/c/2ebf775f0541ae0d474836fa0cf3220e502f8e3e
- URL-https://git.kernel.org/stable/c/46412b2fb1f9cc895d6d4036bf24f640b5d86dab
- URL-https://git.kernel.org/stable/c/82c386d73689a45d5ee8c1290827bce64056dddd
- URL-https://git.kernel.org/stable/c/84f2e5b3e70f08fce3cb1ff73414631c5e490204
- URL-https://git.kernel.org/stable/c/ccab434e674ca95d483788b1895a70c21b7f016a
- URL-https://git.kernel.org/stable/c/d69581c17608d81824dd497d9a54b6a5b6139975
- URL-https://www.cve.org/CVERecord?id=CVE-2023-52655
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.