CVE-2023-53066 (GCVE-0-2023-53066)
Vulnerability from cvelistv5
Published
2025-05-02 15:55
Modified
2025-05-04 07:49
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: qed/qed_sriov: guard against NULL derefs from qed_iov_get_vf_info We have to make sure that the info returned by the helper is valid before using it. Found by Linux Verification Center (linuxtesting.org) with the SVACE static analysis tool.
Impacted products
Vendor Product Version
Linux Linux Version: 733def6a04bf3d2810dd675e1240f8df94d633c3
Version: 733def6a04bf3d2810dd675e1240f8df94d633c3
Version: 733def6a04bf3d2810dd675e1240f8df94d633c3
Version: 733def6a04bf3d2810dd675e1240f8df94d633c3
Version: 733def6a04bf3d2810dd675e1240f8df94d633c3
Version: 733def6a04bf3d2810dd675e1240f8df94d633c3
Version: 733def6a04bf3d2810dd675e1240f8df94d633c3
Version: 733def6a04bf3d2810dd675e1240f8df94d633c3
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/net/ethernet/qlogic/qed/qed_sriov.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "7bd0037822fd04da13721f77a42ee5a077d4c5fb",
              "status": "affected",
              "version": "733def6a04bf3d2810dd675e1240f8df94d633c3",
              "versionType": "git"
            },
            {
              "lessThan": "7742c08e012eb65405e8304d100641638c5ff882",
              "status": "affected",
              "version": "733def6a04bf3d2810dd675e1240f8df94d633c3",
              "versionType": "git"
            },
            {
              "lessThan": "42d72c6d1edc9dc09a5d6f6695d257fa9e9cc270",
              "status": "affected",
              "version": "733def6a04bf3d2810dd675e1240f8df94d633c3",
              "versionType": "git"
            },
            {
              "lessThan": "39c3b9dd481c3afce9439b29bafe00444cb4406b",
              "status": "affected",
              "version": "733def6a04bf3d2810dd675e1240f8df94d633c3",
              "versionType": "git"
            },
            {
              "lessThan": "e42d3bde4ec03c863259878dddaef5c351cca7ad",
              "status": "affected",
              "version": "733def6a04bf3d2810dd675e1240f8df94d633c3",
              "versionType": "git"
            },
            {
              "lessThan": "97ea704f39b5ded96f071e98701aa543f6f89683",
              "status": "affected",
              "version": "733def6a04bf3d2810dd675e1240f8df94d633c3",
              "versionType": "git"
            },
            {
              "lessThan": "b224b0cab3a66e93d414825065a2e667a1d28c32",
              "status": "affected",
              "version": "733def6a04bf3d2810dd675e1240f8df94d633c3",
              "versionType": "git"
            },
            {
              "lessThan": "25143b6a01d0cc5319edd3de22ffa2578b045550",
              "status": "affected",
              "version": "733def6a04bf3d2810dd675e1240f8df94d633c3",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "drivers/net/ethernet/qlogic/qed/qed_sriov.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "4.7"
            },
            {
              "lessThan": "4.7",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.14.*",
              "status": "unaffected",
              "version": "4.14.312",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.19.*",
              "status": "unaffected",
              "version": "4.19.280",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.4.*",
              "status": "unaffected",
              "version": "5.4.240",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.10.*",
              "status": "unaffected",
              "version": "5.10.177",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.15.*",
              "status": "unaffected",
              "version": "5.15.105",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.*",
              "status": "unaffected",
              "version": "6.1.22",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.2.*",
              "status": "unaffected",
              "version": "6.2.9",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.3",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "4.14.312",
                  "versionStartIncluding": "4.7",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "4.19.280",
                  "versionStartIncluding": "4.7",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.4.240",
                  "versionStartIncluding": "4.7",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.10.177",
                  "versionStartIncluding": "4.7",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.15.105",
                  "versionStartIncluding": "4.7",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.1.22",
                  "versionStartIncluding": "4.7",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.2.9",
                  "versionStartIncluding": "4.7",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.3",
                  "versionStartIncluding": "4.7",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nqed/qed_sriov: guard against NULL derefs from qed_iov_get_vf_info\n\nWe have to make sure that the info returned by the helper is valid\nbefore using it.\n\nFound by Linux Verification Center (linuxtesting.org) with the SVACE\nstatic analysis tool."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-04T07:49:04.496Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/7bd0037822fd04da13721f77a42ee5a077d4c5fb"
        },
        {
          "url": "https://git.kernel.org/stable/c/7742c08e012eb65405e8304d100641638c5ff882"
        },
        {
          "url": "https://git.kernel.org/stable/c/42d72c6d1edc9dc09a5d6f6695d257fa9e9cc270"
        },
        {
          "url": "https://git.kernel.org/stable/c/39c3b9dd481c3afce9439b29bafe00444cb4406b"
        },
        {
          "url": "https://git.kernel.org/stable/c/e42d3bde4ec03c863259878dddaef5c351cca7ad"
        },
        {
          "url": "https://git.kernel.org/stable/c/97ea704f39b5ded96f071e98701aa543f6f89683"
        },
        {
          "url": "https://git.kernel.org/stable/c/b224b0cab3a66e93d414825065a2e667a1d28c32"
        },
        {
          "url": "https://git.kernel.org/stable/c/25143b6a01d0cc5319edd3de22ffa2578b045550"
        }
      ],
      "title": "qed/qed_sriov: guard against NULL derefs from qed_iov_get_vf_info",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2023-53066",
    "datePublished": "2025-05-02T15:55:19.730Z",
    "dateReserved": "2025-05-02T15:51:43.548Z",
    "dateUpdated": "2025-05-04T07:49:04.496Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…