CVE-2023-53066

In the Linux kernel, the following vulnerability has been resolved: qed/qed_sriov: guard against NULL derefs from qed_iov_get_vf_info We have to make sure that the info returned by the helper is valid before using it. Found by Linux Verification Center (linuxtesting.org) with the SVACE static analysis tool.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.3:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.3:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.3:rc3:*:*:*:*:*:*

History

12 Nov 2025, 19:47

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:6.3:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.3:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.3:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE CWE-476
First Time Linux
Linux linux Kernel
References () https://git.kernel.org/stable/c/25143b6a01d0cc5319edd3de22ffa2578b045550 - () https://git.kernel.org/stable/c/25143b6a01d0cc5319edd3de22ffa2578b045550 - Patch
References () https://git.kernel.org/stable/c/39c3b9dd481c3afce9439b29bafe00444cb4406b - () https://git.kernel.org/stable/c/39c3b9dd481c3afce9439b29bafe00444cb4406b - Patch
References () https://git.kernel.org/stable/c/42d72c6d1edc9dc09a5d6f6695d257fa9e9cc270 - () https://git.kernel.org/stable/c/42d72c6d1edc9dc09a5d6f6695d257fa9e9cc270 - Patch
References () https://git.kernel.org/stable/c/7742c08e012eb65405e8304d100641638c5ff882 - () https://git.kernel.org/stable/c/7742c08e012eb65405e8304d100641638c5ff882 - Patch
References () https://git.kernel.org/stable/c/7bd0037822fd04da13721f77a42ee5a077d4c5fb - () https://git.kernel.org/stable/c/7bd0037822fd04da13721f77a42ee5a077d4c5fb - Patch
References () https://git.kernel.org/stable/c/97ea704f39b5ded96f071e98701aa543f6f89683 - () https://git.kernel.org/stable/c/97ea704f39b5ded96f071e98701aa543f6f89683 - Patch
References () https://git.kernel.org/stable/c/b224b0cab3a66e93d414825065a2e667a1d28c32 - () https://git.kernel.org/stable/c/b224b0cab3a66e93d414825065a2e667a1d28c32 - Patch
References () https://git.kernel.org/stable/c/e42d3bde4ec03c863259878dddaef5c351cca7ad - () https://git.kernel.org/stable/c/e42d3bde4ec03c863259878dddaef5c351cca7ad - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5

05 May 2025, 20:54

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: qed/qed_sriov: protección contra desreferencias nulas de qed_iov_get_vf_info. Debemos asegurarnos de que la información devuelta por el ayudante sea válida antes de usarla. Encontrada por el Centro de Verificación de Linux (linuxtesting.org) con la herramienta de análisis estático SVACE.

02 May 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-02 16:15

Updated : 2025-11-12 19:47


NVD link : CVE-2023-53066

Mitre link : CVE-2023-53066

CVE.ORG link : CVE-2023-53066


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference