In the Linux kernel, the following vulnerability has been resolved: net: usb: smsc95xx: Limit packet length to skb->len Packet length retrieved from descriptor may be larger than the actual socket buffer length. In such case the cloned skb passed up the network stack will leak kernel memory contents.
https://git.kernel.org/stable/c/ff821092cf02a70c2bccd2d19269f01e29aa52cf
https://git.kernel.org/stable/c/f2111c791d885211714db85f9a06188571c57dd0
https://git.kernel.org/stable/c/e041bef1adee02999cf24f9a2e15ed452bc363fe
https://git.kernel.org/stable/c/d3c145a4d24b752c9a1314d5a595014d51471418
https://git.kernel.org/stable/c/ba6c40227108f8ee428e42eb0337b48ed3001e65
https://git.kernel.org/stable/c/733580e268a53db1cd01f2251419da91866378f6
https://git.kernel.org/stable/c/70eb25c6a6cde149affe8a587371a3a8ad295ba0
https://git.kernel.org/stable/c/33d1603a38e05886c538129ddfe00bd52d347e7b