CVE-2023-53661

Source
https://cve.org/CVERecord?id=CVE-2023-53661
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53661.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-53661
Downstream
Published
2025-10-07T15:21:20.987Z
Modified
2026-03-20T12:33:17.044239Z
Summary
bnxt: avoid overflow in bnxt_get_nvram_directory()
Details

In the Linux kernel, the following vulnerability has been resolved:

bnxt: avoid overflow in bnxtgetnvram_directory()

The value of an arithmetic expression is subject of possible overflow due to a failure to cast operands to a larger data type before performing arithmetic. Used macro for multiplication instead operator for avoiding overflow.

Found by Security Code and Linux Verification Center (linuxtesting.org) with SVACE.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53661.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
c0c050c58d840994ba842ad1c338a98e7c12b764
Fixed
d5eaf2a6b077f32a477feb1e9e1c1f60605b460e
Fixed
efb1a257513438d43f4335f09b2f684e8167cad2
Fixed
17e0453a7523ad7a25bb47af941b150a6c66d7b6
Fixed
7c6dddc239abe660598c49ec95ea0ed6399a4b2a

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53661.json"