CVE-2023-53994Improper Check or Handling of Exceptional Conditions in Linux

Severity
4.0MEDIUM
No vector
EPSS
0.0%
top 89.30%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 24

Description

In the Linux kernel, the following vulnerability has been resolved: ionic: remove WARN_ON to prevent panic_on_warn Remove unnecessary early code development check and the WARN_ON that it uses. The irq alloc and free paths have long been cleaned up and this check shouldn't have stuck around so long.

Affected Packages4 packages

Linuxlinux/linux_kernel5.4.05.4.251+4
Debianlinux/linux_kernel< 5.10.191-1+3
CVEListV5linux/linux77ceb68e29ccd25d923b6af59e74ecaf736cc4b74c7276a6daf7e13a6dd30b0347b3f2c7df4d40bb+6
debiandebian/linux< linux 6.1.52-1 (bookworm)

🔴Vulnerability Details

3
OSV
ionic: remove WARN_ON to prevent panic_on_warn2025-12-24
GHSA
GHSA-xcjm-pf9x-jpg2: In the Linux kernel, the following vulnerability has been resolved: ionic: remove WARN_ON to prevent panic_on_warn Remove unnecessary early code dev2025-12-24
OSV
CVE-2023-53994: In the Linux kernel, the following vulnerability has been resolved: ionic: remove WARN_ON to prevent panic_on_warn Remove unnecessary early code devel2025-12-24

📋Vendor Advisories

2
Red Hat
kernel: ionic: remove WARN_ON to prevent panic_on_warn2025-12-24
Debian
CVE-2023-53994: linux - In the Linux kernel, the following vulnerability has been resolved: ionic: remo...2023

🕵️Threat Intelligence

1
Wiz
CVE-2023-53994 Impact, Exploitability, and Mitigation Steps | Wiz