CVE-2023-53661

Updated: 2026-02-04 04:27:30.86064

Description:

In the Linux kernel, the following vulnerability has been resolved: bnxt: avoid overflow in bnxt_get_nvram_directory() The value of an arithmetic expression is subject of possible overflow due to a failure to cast operands to a larger data type before performing arithmetic. Used macro for multiplication instead operator for avoiding overflow. Found by Security Code and Linux Verification Center (linuxtesting.org) with SVACE.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x 0.0
CVSS Version 3.x MEDIUM 5.5

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

AlmaLinux 9.2 ESU kernel 5.14.0 5.5 MEDIUM Released CLSA-2025:1764151168 2025-11-27 10:40:03
CentOS 8.4 ELS kernel 4.18.0 5.5 MEDIUM Ignored 2025-10-24 08:54:58 Ignored due to low severity
CentOS 8.5 ELS kernel 4.18.0 5.5 MEDIUM Ignored 2025-10-24 08:54:58 Ignored due to low severity
Ubuntu 16.04 ELS linux-hwe 4.15.0 5.5 MEDIUM Ignored 2026-02-04 20:05:45 This flaw is confined to the Broadcom bnxt_en driver’s ethtool NVRAM path and is only triggerable ...
Ubuntu 16.04 ELS linux 4.4.0 5.5 MEDIUM Ignored 2026-02-05 04:15:20 This flaw is confined to the Broadcom bnxt_en driver’s ethtool NVRAM path and is only triggerable ...
Ubuntu 18.04 ELS linux 4.15.0 5.5 MEDIUM Ignored 2026-02-05 04:15:20 This flaw is confined to the Broadcom bnxt_en driver’s ethtool NVRAM path and is only triggerable ...