In the Linux kernel, the following vulnerability has been resolved: net: usb: smsc75xx: Limit packet length to skb->len Packet length retrieved from skb data may be larger than the actual socket buffer length (up to 9026 bytes). In such case the cloned skb passed up the network stack will leak kernel memory contents.
Upstream advisory: https://lore.kernel.org/linux-cve-announce/2025050232-CVE-2023-53125-67cf@gregkh/T
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2025:15785 https://access.redhat.com/errata/RHSA-2025:15785
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2025:16398 https://access.redhat.com/errata/RHSA-2025:16398
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Extended Lifecycle Support Via RHSA-2025:17109 https://access.redhat.com/errata/RHSA-2025:17109
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Extended Lifecycle Support Via RHSA-2025:17161 https://access.redhat.com/errata/RHSA-2025:17161
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.4 Extended Update Support Via RHSA-2025:17958 https://access.redhat.com/errata/RHSA-2025:17958