In the Linux kernel, the following vulnerability has been resolved:
qed/qed_sriov: guard against NULL derefs from qed_iov_get_vf_info
We have to make sure that the info returned by the helper is valid
before using it.
Found by Linux Verification Center (linuxtesting.org) with the SVACE
static analysis tool.
References
Configurations
Configuration 1 (hide)
|
History
12 Nov 2025, 19:47
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.3:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.3:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.3:rc2:*:*:*:*:*:* |
|
| First Time |
Linux linux Kernel
Linux |
|
| CWE | CWE-476 | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| References | () https://git.kernel.org/stable/c/25143b6a01d0cc5319edd3de22ffa2578b045550 - Patch | |
| References | () https://git.kernel.org/stable/c/39c3b9dd481c3afce9439b29bafe00444cb4406b - Patch | |
| References | () https://git.kernel.org/stable/c/42d72c6d1edc9dc09a5d6f6695d257fa9e9cc270 - Patch | |
| References | () https://git.kernel.org/stable/c/7742c08e012eb65405e8304d100641638c5ff882 - Patch | |
| References | () https://git.kernel.org/stable/c/7bd0037822fd04da13721f77a42ee5a077d4c5fb - Patch | |
| References | () https://git.kernel.org/stable/c/97ea704f39b5ded96f071e98701aa543f6f89683 - Patch | |
| References | () https://git.kernel.org/stable/c/b224b0cab3a66e93d414825065a2e667a1d28c32 - Patch | |
| References | () https://git.kernel.org/stable/c/e42d3bde4ec03c863259878dddaef5c351cca7ad - Patch |
Information
Published : 2025-05-02 16:15
Updated : 2025-11-12 19:47
NVD link : CVE-2023-53066
Mitre link : CVE-2023-53066
CVE.ORG link : CVE-2023-53066
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-476
NULL Pointer Dereference
