In the Linux kernel, the following vulnerability has been resolved:
bnxt: avoid overflow in bnxt_get_nvram_directory()
The value of an arithmetic expression is subject
of possible overflow due to a failure to cast operands to a larger data
type before performing arithmetic. Used macro for multiplication instead
operator for avoiding overflow.
Found by Security Code and Linux Verification
Center (linuxtesting.org) with SVACE.
Metrics
Affected Vendors & Products
References
History
Tue, 07 Oct 2025 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the Linux kernel, the following vulnerability has been resolved: bnxt: avoid overflow in bnxt_get_nvram_directory() The value of an arithmetic expression is subject of possible overflow due to a failure to cast operands to a larger data type before performing arithmetic. Used macro for multiplication instead operator for avoiding overflow. Found by Security Code and Linux Verification Center (linuxtesting.org) with SVACE. | |
Title | bnxt: avoid overflow in bnxt_get_nvram_directory() | |
References |
|

Status: PUBLISHED
Assigner: Linux
Published:
Updated: 2025-10-07T15:21:20.987Z
Reserved: 2025-10-07T15:16:59.662Z
Link: CVE-2023-53661

No data.

Status : Received
Published: 2025-10-07T16:15:49.810
Modified: 2025-10-07T16:15:49.810
Link: CVE-2023-53661

No data.

No data.