This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-31912 | This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 02 Oct 2025 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | kernel: xen/netback: Fix buffer overrun triggered by unusual packet | |
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Wed, 01 Oct 2025 14:30:00 +0000
Wed, 01 Oct 2025 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In the Linux kernel, the following vulnerability has been resolved: xen/netback: Fix buffer overrun triggered by unusual packet It is possible that a guest can send a packet that contains a head + 18 slots and yet has a len <= XEN_NETBACK_TX_COPY_LEN. This causes nr_slots to underflow in xenvif_get_requests() which then causes the subsequent loop's termination condition to be wrong, causing a buffer overrun of queue->tx_map_ops. Rework the code to account for the extra frag_overflow slots. This is CVE-2023-34319 / XSA-432. | This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. |
| Title | xen/netback: Fix buffer overrun triggered by unusual packet |
Wed, 01 Oct 2025 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In the Linux kernel, the following vulnerability has been resolved: xen/netback: Fix buffer overrun triggered by unusual packet It is possible that a guest can send a packet that contains a head + 18 slots and yet has a len <= XEN_NETBACK_TX_COPY_LEN. This causes nr_slots to underflow in xenvif_get_requests() which then causes the subsequent loop's termination condition to be wrong, causing a buffer overrun of queue->tx_map_ops. Rework the code to account for the extra frag_overflow slots. This is CVE-2023-34319 / XSA-432. | |
| Title | xen/netback: Fix buffer overrun triggered by unusual packet | |
| References |
|
|
Projects
Sign in to view the affected projects.
Status: REJECTED
Assigner: Linux
Published:
Updated: 2025-10-01T13:08:20.461Z
Reserved: 2025-10-01T11:39:39.404Z
Link: CVE-2023-53502
No data.
Status : Rejected
Published: 2025-10-01T12:15:53.770
Modified: 2025-10-01T14:15:38.687
Link: CVE-2023-53502
OpenCVE Enrichment
No data.
Weaknesses
No weakness.
EUVD