CVE-2023-54070Improper Check or Handling of Exceptional Conditions in Linux

Severity
4.7MEDIUM
No vector
EPSS
0.0%
top 92.35%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 24

Description

In the Linux kernel, the following vulnerability has been resolved: igb: clean up in all error paths when enabling SR-IOV After commit 50f303496d92 ("igb: Enable SR-IOV after reinit"), removing the igb module could hang or crash (depending on the machine) when the module has been loaded with the max_vfs parameter set to some value != 0. In case of one test machine with a dual port 82580, this hang occurred: [ 232.480687] igb 0000:41:00.1: removed PHC on enp65s0f1 [ 233.093257] igb 0000:41:00

Affected Packages4 packages

Linuxlinux/linux_kernel6.3.06.5.4
Debianlinux/linux_kernel< 6.5.6-1+1
CVEListV5linux/linux50f303496d92e25b79bdfb73e3707ad0684ad67f0e3ea7e82a06014b9baf1b84ba579c38cbff3558+2
debiandebian/linux< linux 6.5.6-1 (forky)

🔴Vulnerability Details

3
OSV
CVE-2023-54070: In the Linux kernel, the following vulnerability has been resolved: igb: clean up in all error paths when enabling SR-IOV After commit 50f303496d92 ("2025-12-24
OSV
igb: clean up in all error paths when enabling SR-IOV2025-12-24
GHSA
GHSA-j844-9pmv-wmhv: In the Linux kernel, the following vulnerability has been resolved: igb: clean up in all error paths when enabling SR-IOV After commit 50f303496d922025-12-24

📋Vendor Advisories

2
Red Hat
kernel: Linux kernel igb driver: Denial of Service due to improper SR-IOV cleanup2025-12-24
Debian
CVE-2023-54070: linux - In the Linux kernel, the following vulnerability has been resolved: igb: clean ...2023

🕵️Threat Intelligence

1
Wiz
CVE-2023-54070 Impact, Exploitability, and Mitigation Steps | Wiz