CVE-2023-53066

In the Linux kernel, the following vulnerability has been resolved:

qed/qed_sriov: guard against NULL derefs from qed_iov_get_vf_info

We have to make sure that the info returned by the helper is valid
before using it.

Found by Linux Verification Center (linuxtesting.org) with the SVACE
static analysis tool.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5.5 MEDIUM
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
LinuxCNA
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 5%
VendorProductVersion
linuxlinux_kernel
4.7 ≤
𝑥
< 4.14.312
linuxlinux_kernel
4.15 ≤
𝑥
< 4.19.280
linuxlinux_kernel
4.20 ≤
𝑥
< 5.4.240
linuxlinux_kernel
5.5 ≤
𝑥
< 5.10.177
linuxlinux_kernel
5.11 ≤
𝑥
< 5.15.105
linuxlinux_kernel
5.16 ≤
𝑥
< 6.1.22
linuxlinux_kernel
6.2 ≤
𝑥
< 6.2.9
linuxlinux_kernel
6.3:rc1
linuxlinux_kernel
6.3:rc2
linuxlinux_kernel
6.3:rc3
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
linux
bullseye
5.10.223-1
fixed
bullseye (security)
5.10.234-1
fixed
bookworm
6.1.129-1
fixed
bookworm (security)
6.1.135-1
fixed
trixie
6.12.22-1
fixed
sid
6.12.25-1
fixed