In the Linux kernel, the following vulnerability has been resolved:
bnxt: avoid overflow in bnxtgetnvram_directory()
The value of an arithmetic expression is subject of possible overflow due to a failure to cast operands to a larger data type before performing arithmetic. Used macro for multiplication instead operator for avoiding overflow.
Found by Security Code and Linux Verification Center (linuxtesting.org) with SVACE.
[
{
"signature_type": "Line",
"deprecated": false,
"digest": {
"line_hashes": [
"60945229841498470552468423732176803465",
"12540154048741618112014484302635878338",
"89812618104941819837833407162802268934",
"327990941781767878858924875325378362586"
],
"threshold": 0.9
},
"target": {
"file": "drivers/net/ethernet/broadcom/bnxt/bnxt_ethtool.c"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@efb1a257513438d43f4335f09b2f684e8167cad2",
"signature_version": "v1",
"id": "CVE-2023-53661-a3e2f97c"
},
{
"signature_type": "Function",
"deprecated": false,
"digest": {
"length": 840.0,
"function_hash": "29421388484437807800791875120140676577"
},
"target": {
"file": "drivers/net/ethernet/broadcom/bnxt/bnxt_ethtool.c",
"function": "bnxt_get_nvram_directory"
},
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@efb1a257513438d43f4335f09b2f684e8167cad2",
"signature_version": "v1",
"id": "CVE-2023-53661-b45478bd"
}
]