In the Linux kernel, the following vulnerability has been resolved:
net: bcmgenet: Add a check for oversized packets
Occasionnaly we may get oversized packets from the hardware which
exceed the nomimal 2KiB buffer size we allocate SKBs with. Add an early
check which drops the packet to avoid invoking skb_over_panic() and move
on to processing the next packet.
References
Configurations
Configuration 1 (hide)
|
History
09 Feb 2026, 22:06
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| First Time |
Linux
Linux linux Kernel |
|
| References | () https://git.kernel.org/stable/c/124ca24e0de958d2e20e0aa1e2434af7b72f8887 - Patch | |
| References | () https://git.kernel.org/stable/c/411317d2a4a7d6049d8efeef0d32ae43f8baefce - Patch | |
| References | () https://git.kernel.org/stable/c/5c0862c2c962052ed5055220a00ac1cefb92fbcd - Patch | |
| References | () https://git.kernel.org/stable/c/5f56767fb5f2df875b6553e08dbec6a45431c988 - Patch | |
| References | () https://git.kernel.org/stable/c/7cdb07e10c1258c08f31b24898930e4ece88d163 - Patch | |
| References | () https://git.kernel.org/stable/c/841881320562cbeac7046b537b91cd000480cea2 - Patch | |
| References | () https://git.kernel.org/stable/c/87363d1ab55e497702a9506ff423c422639c8a25 - Patch | |
| References | () https://git.kernel.org/stable/c/c34b1c0870323649d45c5074828d7f754dea2673 - Patch | |
| CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
| CWE | NVD-CWE-noinfo |
04 Oct 2025, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-10-04 16:15
Updated : 2026-02-09 22:06
NVD link : CVE-2023-53535
Mitre link : CVE-2023-53535
CVE.ORG link : CVE-2023-53535
JSON object : View
Products Affected
linux
- linux_kernel
CWE
