CVE-2023-53994

Source
https://cve.org/CVERecord?id=CVE-2023-53994
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53994.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-53994
Downstream
Related
Published
2025-12-24T10:55:32.024Z
Modified
2026-03-31T17:29:49.330502167Z
Summary
ionic: remove WARN_ON to prevent panic_on_warn
Details

In the Linux kernel, the following vulnerability has been resolved:

ionic: remove WARNON to prevent panicon_warn

Remove unnecessary early code development check and the WARN_ON that it uses. The irq alloc and free paths have long been cleaned up and this check shouldn't have stuck around so long.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53994.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
77ceb68e29ccd25d923b6af59e74ecaf736cc4b7
Fixed
4c7276a6daf7e13a6dd30b0347b3f2c7df4d40bb
Fixed
f8cc4fd99a325505e15c3da95d6de266efd3d9b5
Fixed
1417dd787a5e55b410a00a28231b0dcb19172457
Fixed
dc470466753ad0dd3a8c48aaefa05a992c119b9c
Fixed
daeaad114cb163ec51bcf14326cb7fe37d368459
Fixed
abfb2a58a5377ebab717d4362d6180f901b6e5c1

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53994.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.4.0
Fixed
5.4.251
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.188
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.121
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.40
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.4.5

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53994.json"