CVE-2023-53661

In the Linux kernel, the following vulnerability has been resolved: bnxt: avoid overflow in bnxt_get_nvram_directory() The value of an arithmetic expression is subject of possible overflow due to a failure to cast operands to a larger data type before performing arithmetic. Used macro for multiplication instead operator for avoiding overflow. Found by Security Code and Linux Verification Center (linuxtesting.org) with SVACE.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

03 Feb 2026, 19:55

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux linux Kernel
Linux
CWE CWE-190
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/17e0453a7523ad7a25bb47af941b150a6c66d7b6 - () https://git.kernel.org/stable/c/17e0453a7523ad7a25bb47af941b150a6c66d7b6 - Patch
References () https://git.kernel.org/stable/c/7c6dddc239abe660598c49ec95ea0ed6399a4b2a - () https://git.kernel.org/stable/c/7c6dddc239abe660598c49ec95ea0ed6399a4b2a - Patch
References () https://git.kernel.org/stable/c/d5eaf2a6b077f32a477feb1e9e1c1f60605b460e - () https://git.kernel.org/stable/c/d5eaf2a6b077f32a477feb1e9e1c1f60605b460e - Patch
References () https://git.kernel.org/stable/c/efb1a257513438d43f4335f09b2f684e8167cad2 - () https://git.kernel.org/stable/c/efb1a257513438d43f4335f09b2f684e8167cad2 - Patch

Information

Published : 2025-10-07 16:15

Updated : 2026-02-03 19:55


NVD link : CVE-2023-53661

Mitre link : CVE-2023-53661

CVE.ORG link : CVE-2023-53661


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-190

Integer Overflow or Wraparound