Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: bnxt: avoid overflow in bnxt_get_nvram_directory() The value of an arithmetic expression is subject of possible overflow due to a failure to cast operands to a larger data type before performing arithmetic. Used macro for multiplication instead operator for avoiding overflow. Found by Security Code and Linux Verification Center (linuxtesting.org) with SVACE.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 4.4, < 5.15.113 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/17e0453a7523ad7a25bb47af941b150a6c66d7b6Patch
- https://git.kernel.org/stable/c/7c6dddc239abe660598c49ec95ea0ed6399a4b2aPatch
- https://git.kernel.org/stable/c/d5eaf2a6b077f32a477feb1e9e1c1f60605b460ePatch
- https://git.kernel.org/stable/c/efb1a257513438d43f4335f09b2f684e8167cad2Patch
FAQ
What is CVE-2023-53661?
CVE-2023-53661 is a vulnerability with a CVSS score of 5.5 (MEDIUM). In the Linux kernel, the following vulnerability has been resolved: bnxt: avoid overflow in bnxt_get_nvram_directory() The value of an arithmetic expression is subject of possible overflow due to a ...
How severe is CVE-2023-53661?
CVE-2023-53661 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-53661?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.