CVE-2023-53535
BaseFortify
Publication date: 2025-10-04
Last updated on: 2026-03-23
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 4.15 (inc) to 4.19.276 (exc) |
| linux | linux_kernel | From 4.20 (inc) to 5.4.235 (exc) |
| linux | linux_kernel | From 5.5 (inc) to 5.10.173 (exc) |
| linux | linux_kernel | From 5.11 (inc) to 5.15.99 (exc) |
| linux | linux_kernel | From 5.16 (inc) to 6.1.16 (exc) |
| linux | linux_kernel | From 6.2 (inc) to 6.2.3 (exc) |
| linux | linux_kernel | From 3.15 (inc) to 4.14.308 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's bcmgenet network driver where oversized packets from hardware can exceed the allocated 2KiB buffer size for socket buffers (SKBs). Without proper checks, these oversized packets can cause a panic in the kernel (skb_over_panic). The fix adds an early check to drop such oversized packets to prevent this panic and allow normal processing of subsequent packets.
How can this vulnerability impact me? :
If exploited or triggered, this vulnerability can cause the Linux kernel to panic due to oversized network packets, potentially leading to system instability or denial of service by crashing the kernel or disrupting network operations.