CVE-2023-54166Race Condition in Linux

CWE-362Race Condition7 documents6 sources
Severity
4.7MEDIUM
No vector
EPSS
0.0%
top 92.73%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 30

Description

In the Linux kernel, the following vulnerability has been resolved: igc: Fix Kernel Panic during ndo_tx_timeout callback The Xeon validation group has been carrying out some loaded tests with various HW configurations, and they have seen some transmit queue time out happening during the test. This will cause the reset adapter function to be called by igc_tx_timeout(). Similar race conditions may arise when the interface is being brought down and up in igc_reinit_locked(), an interrupt being ge

Affected Packages4 packages

Linuxlinux/linux_kernel5.16.06.1.43+2
Debianlinux/linux_kernel< 6.1.52-1+2
CVEListV5linux/linux48d6d8f2f6096ef51bd193e2a2fb59cbbc350599feba294c454a51bb1e80dd2ff038e335f07ae481+4
debiandebian/linux< linux 6.1.52-1 (bookworm)

🔴Vulnerability Details

3
OSV
CVE-2023-54166: In the Linux kernel, the following vulnerability has been resolved: igc: Fix Kernel Panic during ndo_tx_timeout callback The Xeon validation group has2025-12-30
OSV
igc: Fix Kernel Panic during ndo_tx_timeout callback2025-12-30
GHSA
GHSA-632c-w85f-cm68: In the Linux kernel, the following vulnerability has been resolved: igc: Fix Kernel Panic during ndo_tx_timeout callback The Xeon validation group h2025-12-30

📋Vendor Advisories

2
Red Hat
kernel: igc: Fix Kernel Panic during ndo_tx_timeout callback2025-12-30
Debian
CVE-2023-54166: linux - In the Linux kernel, the following vulnerability has been resolved: igc: Fix Ke...2023

🕵️Threat Intelligence

1
Wiz
CVE-2023-54166 Impact, Exploitability, and Mitigation Steps | Wiz