{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2023-53470","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2025-10-01T11:39:39.400Z","datePublished":"2025-10-01T11:42:40.221Z","dateUpdated":"2026-05-11T19:45:36.431Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T19:45:36.431Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nionic: catch failure from devlink_alloc\n\nAdd a check for NULL on the alloc return.  If devlink_alloc() fails and\nwe try to use devlink_priv() on the NULL return, the kernel gets very\nunhappy and panics. With this fix, the driver load will still fail,\nbut at least it won't panic the kernel."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/net/ethernet/pensando/ionic/ionic_devlink.c"],"versions":[{"version":"df69ba43217d3cf4215c83c0627ce98a26e56e7c","lessThan":"c177dd465f5c1e5f242cdb9258826c591c257e9a","status":"affected","versionType":"git"},{"version":"df69ba43217d3cf4215c83c0627ce98a26e56e7c","lessThan":"0d02efe7f25158c93146e3bb827bc7bb3cd5e71a","status":"affected","versionType":"git"},{"version":"df69ba43217d3cf4215c83c0627ce98a26e56e7c","lessThan":"5325f50de5b1433b27dda7ccff5cb7283722a3f1","status":"affected","versionType":"git"},{"version":"df69ba43217d3cf4215c83c0627ce98a26e56e7c","lessThan":"0020c16c8af7f4bc9503a2088fb30793b6771fac","status":"affected","versionType":"git"},{"version":"df69ba43217d3cf4215c83c0627ce98a26e56e7c","lessThan":"4a54903ff68ddb33b6463c94b4eb37fc584ef760","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/net/ethernet/pensando/ionic/ionic_devlink.c"],"versions":[{"version":"5.4","status":"affected"},{"version":"0","lessThan":"5.4","status":"unaffected","versionType":"semver"},{"version":"5.15.112","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.29","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.2.16","lessThanOrEqual":"6.2.*","status":"unaffected","versionType":"semver"},{"version":"6.3.3","lessThanOrEqual":"6.3.*","status":"unaffected","versionType":"semver"},{"version":"6.4","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.4","versionEndExcluding":"5.15.112"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.4","versionEndExcluding":"6.1.29"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.4","versionEndExcluding":"6.2.16"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.4","versionEndExcluding":"6.3.3"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.4","versionEndExcluding":"6.4"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/c177dd465f5c1e5f242cdb9258826c591c257e9a"},{"url":"https://git.kernel.org/stable/c/0d02efe7f25158c93146e3bb827bc7bb3cd5e71a"},{"url":"https://git.kernel.org/stable/c/5325f50de5b1433b27dda7ccff5cb7283722a3f1"},{"url":"https://git.kernel.org/stable/c/0020c16c8af7f4bc9503a2088fb30793b6771fac"},{"url":"https://git.kernel.org/stable/c/4a54903ff68ddb33b6463c94b4eb37fc584ef760"}],"title":"ionic: catch failure from devlink_alloc","x_generator":{"engine":"bippy-1.2.0"}}}}