-
CVE-2023-53299
- EPSS 0.04%
- Published 16.09.2025 08:11:30
- Last modified 16.09.2025 12:49:16
- Source 416baaa9-dc9f-4396-8d5f-8c081f
- Teams watchlist Login
- Open Login
In the Linux kernel, the following vulnerability has been resolved: md/raid10: fix leak of 'r10bio->remaining' for recovery raid10_sync_request() will add 'r10bio->remaining' for both rdev and replacement rdev. However, if the read io fails, recovery_request_write() returns without issuing the write io, in this case, end_sync_request() is only called once and 'remaining' is leaked, cause an io hang. Fix the problem by decreasing 'remaining' according to if 'bio' and 'repl_bio' is valid.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
≫
Product
Linux
Default Statusunaffected
Version <
cb827ed2bb34480dc102146d3a1f89fdbcafc028
Version
24afd80d99f80a79d8824d2805114b8b067e9823
Status
affected
Version <
1d2c6c6e37fe5de11fd01a82badf03390e12df7a
Version
24afd80d99f80a79d8824d2805114b8b067e9823
Status
affected
Version <
8c5d5d7ffd1e76734811b8ea5417cf0432b9952c
Version
24afd80d99f80a79d8824d2805114b8b067e9823
Status
affected
Version <
1697fb124c6d6c5237e9cbd78890310154738084
Version
24afd80d99f80a79d8824d2805114b8b067e9823
Status
affected
Version <
8d09065802c53cc938d162b62f6c4150b392c90e
Version
24afd80d99f80a79d8824d2805114b8b067e9823
Status
affected
Version <
11141630f03efffdfe260b3582b2d93d38171b97
Version
24afd80d99f80a79d8824d2805114b8b067e9823
Status
affected
Version <
3481dec5ecbbbbe44ab23e22c2b14bd65c644ec6
Version
24afd80d99f80a79d8824d2805114b8b067e9823
Status
affected
Version <
4f82e7e07cdaf2947d71968e3d6b73370a217093
Version
24afd80d99f80a79d8824d2805114b8b067e9823
Status
affected
Version <
26208a7cffd0c7cbf14237ccd20c7270b3ffeb7e
Version
24afd80d99f80a79d8824d2805114b8b067e9823
Status
affected
VendorLinux
≫
Product
Linux
Default Statusaffected
Version
3.3
Status
affected
Version <
3.3
Version
0
Status
unaffected
Version <=
4.14.*
Version
4.14.315
Status
unaffected
Version <=
4.19.*
Version
4.19.283
Status
unaffected
Version <=
5.4.*
Version
5.4.243
Status
unaffected
Version <=
5.10.*
Version
5.10.180
Status
unaffected
Version <=
5.15.*
Version
5.15.111
Status
unaffected
Version <=
6.1.*
Version
6.1.28
Status
unaffected
Version <=
6.2.*
Version
6.2.15
Status
unaffected
Version <=
6.3.*
Version
6.3.2
Status
unaffected
Version <=
*
Version
6.4
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.04% | 0.126 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|