{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2023-53060","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2025-05-02T15:51:43.547Z","datePublished":"2025-05-02T15:55:14.418Z","dateUpdated":"2026-05-11T19:37:47.574Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T19:37:47.574Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nigb: revert rtnl_lock() that causes deadlock\n\nThe commit 6faee3d4ee8b (\"igb: Add lock to avoid data race\") adds\nrtnl_lock to eliminate a false data race shown below\n\n (FREE from device detaching)      |   (USE from netdev core)\nigb_remove                         |  igb_ndo_get_vf_config\n igb_disable_sriov                 |  vf >= adapter->vfs_allocated_count?\n  kfree(adapter->vf_data)          |\n  adapter->vfs_allocated_count = 0 |\n                                   |    memcpy(... adapter->vf_data[vf]\n\nThe above race will never happen and the extra rtnl_lock causes deadlock\nbelow\n\n[  141.420169]  <TASK>\n[  141.420672]  __schedule+0x2dd/0x840\n[  141.421427]  schedule+0x50/0xc0\n[  141.422041]  schedule_preempt_disabled+0x11/0x20\n[  141.422678]  __mutex_lock.isra.13+0x431/0x6b0\n[  141.423324]  unregister_netdev+0xe/0x20\n[  141.423578]  igbvf_remove+0x45/0xe0 [igbvf]\n[  141.423791]  pci_device_remove+0x36/0xb0\n[  141.423990]  device_release_driver_internal+0xc1/0x160\n[  141.424270]  pci_stop_bus_device+0x6d/0x90\n[  141.424507]  pci_stop_and_remove_bus_device+0xe/0x20\n[  141.424789]  pci_iov_remove_virtfn+0xba/0x120\n[  141.425452]  sriov_disable+0x2f/0xf0\n[  141.425679]  igb_disable_sriov+0x4e/0x100 [igb]\n[  141.426353]  igb_remove+0xa0/0x130 [igb]\n[  141.426599]  pci_device_remove+0x36/0xb0\n[  141.426796]  device_release_driver_internal+0xc1/0x160\n[  141.427060]  driver_detach+0x44/0x90\n[  141.427253]  bus_remove_driver+0x55/0xe0\n[  141.427477]  pci_unregister_driver+0x2a/0xa0\n[  141.428296]  __x64_sys_delete_module+0x141/0x2b0\n[  141.429126]  ? mntput_no_expire+0x4a/0x240\n[  141.429363]  ? syscall_trace_enter.isra.19+0x126/0x1a0\n[  141.429653]  do_syscall_64+0x5b/0x80\n[  141.429847]  ? exit_to_user_mode_prepare+0x14d/0x1c0\n[  141.430109]  ? syscall_exit_to_user_mode+0x12/0x30\n[  141.430849]  ? do_syscall_64+0x67/0x80\n[  141.431083]  ? syscall_exit_to_user_mode_prepare+0x183/0x1b0\n[  141.431770]  ? syscall_exit_to_user_mode+0x12/0x30\n[  141.432482]  ? do_syscall_64+0x67/0x80\n[  141.432714]  ? exc_page_fault+0x64/0x140\n[  141.432911]  entry_SYSCALL_64_after_hwframe+0x72/0xdc\n\nSince the igb_disable_sriov() will call pci_disable_sriov() before\nreleasing any resources, the netdev core will synchronize the cleanup to\navoid any races. This patch removes the useless rtnl_(un)lock to guarantee\ncorrectness."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/net/ethernet/intel/igb/igb_main.c"],"versions":[{"version":"5773a1e6e5ba9f62c4573c57878d154fda269bc2","lessThan":"0dabb72b923e17cb3b4ac99ea1adc9ef35116930","status":"affected","versionType":"git"},{"version":"2e8a30c1d994d91099fa8762f504b2ac9dce2cf7","lessThan":"7d845e9a485f287181ff81567c3900a8e7ad1e28","status":"affected","versionType":"git"},{"version":"55197ba6d64d48f1948e6e1f52482e0e3e38e1bf","lessThan":"cd1e320ac0958298c2774605ad050483f33a21f2","status":"affected","versionType":"git"},{"version":"0f516dcd1456b18b56a7de0c1f67b8a4aa54c2ef","lessThan":"4d2626e10709ff8474ffd1a9db3cf4647569e89c","status":"affected","versionType":"git"},{"version":"8ee44abe4cae06713db33e0a3b1e87bfb95b13ef","lessThan":"66e5577cabc3d463eea540332727929d0ace41c6","status":"affected","versionType":"git"},{"version":"6faee3d4ee8be0f0367d0c3d826afb3571b7a5e0","lessThan":"62a64645749926f9d75af82a96440941f22b046f","status":"affected","versionType":"git"},{"version":"6faee3d4ee8be0f0367d0c3d826afb3571b7a5e0","lessThan":"de91528d8ba274c614a2265077d695c61e31fd43","status":"affected","versionType":"git"},{"version":"6faee3d4ee8be0f0367d0c3d826afb3571b7a5e0","lessThan":"65f69851e44d71248b952a687e44759a7abb5016","status":"affected","versionType":"git"},{"version":"64c0c233a88591bb23569ae12eed7f74e5bd39ce","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/net/ethernet/intel/igb/igb_main.c"],"versions":[{"version":"6.0","status":"affected"},{"version":"0","lessThan":"6.0","status":"unaffected","versionType":"semver"},{"version":"4.14.312","lessThanOrEqual":"4.14.*","status":"unaffected","versionType":"semver"},{"version":"4.19.280","lessThanOrEqual":"4.19.*","status":"unaffected","versionType":"semver"},{"version":"5.4.240","lessThanOrEqual":"5.4.*","status":"unaffected","versionType":"semver"},{"version":"5.10.177","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.105","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.22","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.2.9","lessThanOrEqual":"6.2.*","status":"unaffected","versionType":"semver"},{"version":"6.3","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.14.291","versionEndExcluding":"4.14.312"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.19.256","versionEndExcluding":"4.19.280"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.4.211","versionEndExcluding":"5.4.240"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.10.138","versionEndExcluding":"5.10.177"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.15.63","versionEndExcluding":"5.15.105"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.0","versionEndExcluding":"6.1.22"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.0","versionEndExcluding":"6.2.9"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.0","versionEndExcluding":"6.3"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.19.4"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/0dabb72b923e17cb3b4ac99ea1adc9ef35116930"},{"url":"https://git.kernel.org/stable/c/7d845e9a485f287181ff81567c3900a8e7ad1e28"},{"url":"https://git.kernel.org/stable/c/cd1e320ac0958298c2774605ad050483f33a21f2"},{"url":"https://git.kernel.org/stable/c/4d2626e10709ff8474ffd1a9db3cf4647569e89c"},{"url":"https://git.kernel.org/stable/c/66e5577cabc3d463eea540332727929d0ace41c6"},{"url":"https://git.kernel.org/stable/c/62a64645749926f9d75af82a96440941f22b046f"},{"url":"https://git.kernel.org/stable/c/de91528d8ba274c614a2265077d695c61e31fd43"},{"url":"https://git.kernel.org/stable/c/65f69851e44d71248b952a687e44759a7abb5016"}],"title":"igb: revert rtnl_lock() that causes deadlock","x_generator":{"engine":"bippy-1.2.0"}}}}