0.0
NA
CVE-2023-53066
QLogic qed NULL Pointer Dereference Vulnerability
Description

In the Linux kernel, the following vulnerability has been resolved: qed/qed_sriov: guard against NULL derefs from qed_iov_get_vf_info We have to make sure that the info returned by the helper is valid before using it. Found by Linux Verification Center (linuxtesting.org) with the SVACE static analysis tool.

INFO

Published Date :

May 2, 2025, 4:15 p.m.

Last Modified :

May 5, 2025, 8:54 p.m.

Source :

416baaa9-dc9f-4396-8d5f-8c081fb06d67

Remotely Exploitable :

No

Impact Score :

Exploitability Score :

Affected Products

The following products are affected by CVE-2023-53066 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Linux linux_kernel

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2023-53066 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2023-53066 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • New CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67

    May. 02, 2025

    Action Type Old Value New Value
    Added Description In the Linux kernel, the following vulnerability has been resolved: qed/qed_sriov: guard against NULL derefs from qed_iov_get_vf_info We have to make sure that the info returned by the helper is valid before using it. Found by Linux Verification Center (linuxtesting.org) with the SVACE static analysis tool.
    Added Reference https://git.kernel.org/stable/c/25143b6a01d0cc5319edd3de22ffa2578b045550
    Added Reference https://git.kernel.org/stable/c/39c3b9dd481c3afce9439b29bafe00444cb4406b
    Added Reference https://git.kernel.org/stable/c/42d72c6d1edc9dc09a5d6f6695d257fa9e9cc270
    Added Reference https://git.kernel.org/stable/c/7742c08e012eb65405e8304d100641638c5ff882
    Added Reference https://git.kernel.org/stable/c/7bd0037822fd04da13721f77a42ee5a077d4c5fb
    Added Reference https://git.kernel.org/stable/c/97ea704f39b5ded96f071e98701aa543f6f89683
    Added Reference https://git.kernel.org/stable/c/b224b0cab3a66e93d414825065a2e667a1d28c32
    Added Reference https://git.kernel.org/stable/c/e42d3bde4ec03c863259878dddaef5c351cca7ad
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2023-53066 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2023-53066 weaknesses.

NONE - Vulnerability Scoring System
© cvefeed.io
Latest DB Update: Jun. 07, 2025 10:35