{
  "affected": [
    {
      "ranges": [
        {
          "events": [
            {
              "introduced": "1c1008c793fa46703a2fee469f4235e1c7984333"
            },
            {
              "fixed": "7cdb07e10c1258c08f31b24898930e4ece88d163"
            },
            {
              "fixed": "c34b1c0870323649d45c5074828d7f754dea2673"
            },
            {
              "fixed": "87363d1ab55e497702a9506ff423c422639c8a25"
            },
            {
              "fixed": "841881320562cbeac7046b537b91cd000480cea2"
            },
            {
              "fixed": "124ca24e0de958d2e20e0aa1e2434af7b72f8887"
            },
            {
              "fixed": "5f56767fb5f2df875b6553e08dbec6a45431c988"
            },
            {
              "fixed": "411317d2a4a7d6049d8efeef0d32ae43f8baefce"
            },
            {
              "fixed": "5c0862c2c962052ed5055220a00ac1cefb92fbcd"
            }
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "type": "GIT"
        }
      ]
    }
  ],
  "database_specific": {
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53535.json"
  },
  "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: bcmgenet: Add a check for oversized packets\n\nOccasionnaly we may get oversized packets from the hardware which\nexceed the nomimal 2KiB buffer size we allocate SKBs with. Add an early\ncheck which drops the packet to avoid invoking skb_over_panic() and move\non to processing the next packet.",
  "id": "CVE-2023-53535",
  "modified": "2026-04-01T23:08:40.319045849Z",
  "published": "2025-10-04T15:16:46.583Z",
  "references": [
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/124ca24e0de958d2e20e0aa1e2434af7b72f8887"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/411317d2a4a7d6049d8efeef0d32ae43f8baefce"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/5c0862c2c962052ed5055220a00ac1cefb92fbcd"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/5f56767fb5f2df875b6553e08dbec6a45431c988"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/7cdb07e10c1258c08f31b24898930e4ece88d163"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/841881320562cbeac7046b537b91cd000480cea2"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/87363d1ab55e497702a9506ff423c422639c8a25"
    },
    {
      "type": "WEB",
      "url": "https://git.kernel.org/stable/c/c34b1c0870323649d45c5074828d7f754dea2673"
    },
    {
      "type": "ADVISORY",
      "url": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53535.json"
    },
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-53535"
    },
    {
      "type": "PACKAGE",
      "url": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"
    }
  ],
  "schema_version": "1.7.3",
  "summary": "net: bcmgenet: Add a check for oversized packets"
}