This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
Metrics
Affected Vendors & Products
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
No reference.
History
Wed, 01 Oct 2025 14:30:00 +0000
Wed, 01 Oct 2025 13:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the Linux kernel, the following vulnerability has been resolved: xen/netback: Fix buffer overrun triggered by unusual packet It is possible that a guest can send a packet that contains a head + 18 slots and yet has a len <= XEN_NETBACK_TX_COPY_LEN. This causes nr_slots to underflow in xenvif_get_requests() which then causes the subsequent loop's termination condition to be wrong, causing a buffer overrun of queue->tx_map_ops. Rework the code to account for the extra frag_overflow slots. This is CVE-2023-34319 / XSA-432. | This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. |
Title | xen/netback: Fix buffer overrun triggered by unusual packet |
Wed, 01 Oct 2025 12:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the Linux kernel, the following vulnerability has been resolved: xen/netback: Fix buffer overrun triggered by unusual packet It is possible that a guest can send a packet that contains a head + 18 slots and yet has a len <= XEN_NETBACK_TX_COPY_LEN. This causes nr_slots to underflow in xenvif_get_requests() which then causes the subsequent loop's termination condition to be wrong, causing a buffer overrun of queue->tx_map_ops. Rework the code to account for the extra frag_overflow slots. This is CVE-2023-34319 / XSA-432. | |
Title | xen/netback: Fix buffer overrun triggered by unusual packet | |
References |
|
|

Status: REJECTED
Assigner: Linux
Published:
Updated: 2025-10-01T13:08:20.461Z
Reserved: 2025-10-01T11:39:39.404Z
Link: CVE-2023-53502

No data.

Status : Rejected
Published: 2025-10-01T12:15:53.770
Modified: 2025-10-01T14:15:38.687
Link: CVE-2023-53502

No data.

No data.