CVE-2023-53066

In the Linux kernel, the following vulnerability has been resolved: qed/qed_sriov: guard against NULL derefs from qed_iov_get_vf_info We have to make sure that the info returned by the helper is valid before using it. Found by Linux Verification Center (linuxtesting.org) with the SVACE static analysis tool.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.3:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.3:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.3:rc3:*:*:*:*:*:*

History

12 Nov 2025, 19:47

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.3:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.3:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.3:rc2:*:*:*:*:*:*
First Time Linux linux Kernel
Linux
CWE CWE-476
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/25143b6a01d0cc5319edd3de22ffa2578b045550 - () https://git.kernel.org/stable/c/25143b6a01d0cc5319edd3de22ffa2578b045550 - Patch
References () https://git.kernel.org/stable/c/39c3b9dd481c3afce9439b29bafe00444cb4406b - () https://git.kernel.org/stable/c/39c3b9dd481c3afce9439b29bafe00444cb4406b - Patch
References () https://git.kernel.org/stable/c/42d72c6d1edc9dc09a5d6f6695d257fa9e9cc270 - () https://git.kernel.org/stable/c/42d72c6d1edc9dc09a5d6f6695d257fa9e9cc270 - Patch
References () https://git.kernel.org/stable/c/7742c08e012eb65405e8304d100641638c5ff882 - () https://git.kernel.org/stable/c/7742c08e012eb65405e8304d100641638c5ff882 - Patch
References () https://git.kernel.org/stable/c/7bd0037822fd04da13721f77a42ee5a077d4c5fb - () https://git.kernel.org/stable/c/7bd0037822fd04da13721f77a42ee5a077d4c5fb - Patch
References () https://git.kernel.org/stable/c/97ea704f39b5ded96f071e98701aa543f6f89683 - () https://git.kernel.org/stable/c/97ea704f39b5ded96f071e98701aa543f6f89683 - Patch
References () https://git.kernel.org/stable/c/b224b0cab3a66e93d414825065a2e667a1d28c32 - () https://git.kernel.org/stable/c/b224b0cab3a66e93d414825065a2e667a1d28c32 - Patch
References () https://git.kernel.org/stable/c/e42d3bde4ec03c863259878dddaef5c351cca7ad - () https://git.kernel.org/stable/c/e42d3bde4ec03c863259878dddaef5c351cca7ad - Patch

Information

Published : 2025-05-02 16:15

Updated : 2025-11-12 19:47


NVD link : CVE-2023-53066

Mitre link : CVE-2023-53066

CVE.ORG link : CVE-2023-53066


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-476

NULL Pointer Dereference