This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

References

No reference.

History

Wed, 01 Oct 2025 14:30:00 +0000


Wed, 01 Oct 2025 13:30:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: xen/netback: Fix buffer overrun triggered by unusual packet It is possible that a guest can send a packet that contains a head + 18 slots and yet has a len <= XEN_NETBACK_TX_COPY_LEN. This causes nr_slots to underflow in xenvif_get_requests() which then causes the subsequent loop's termination condition to be wrong, causing a buffer overrun of queue->tx_map_ops. Rework the code to account for the extra frag_overflow slots. This is CVE-2023-34319 / XSA-432. This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
Title xen/netback: Fix buffer overrun triggered by unusual packet

Wed, 01 Oct 2025 12:00:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: xen/netback: Fix buffer overrun triggered by unusual packet It is possible that a guest can send a packet that contains a head + 18 slots and yet has a len <= XEN_NETBACK_TX_COPY_LEN. This causes nr_slots to underflow in xenvif_get_requests() which then causes the subsequent loop's termination condition to be wrong, causing a buffer overrun of queue->tx_map_ops. Rework the code to account for the extra frag_overflow slots. This is CVE-2023-34319 / XSA-432.
Title xen/netback: Fix buffer overrun triggered by unusual packet
References

cve-icon MITRE

Status: REJECTED

Assigner: Linux

Published:

Updated: 2025-10-01T13:08:20.461Z

Reserved: 2025-10-01T11:39:39.404Z

Link: CVE-2023-53502

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Rejected

Published: 2025-10-01T12:15:53.770

Modified: 2025-10-01T14:15:38.687

Link: CVE-2023-53502

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.