-

CVE-2023-53299

In the Linux kernel, the following vulnerability has been resolved:

md/raid10: fix leak of 'r10bio->remaining' for recovery

raid10_sync_request() will add 'r10bio->remaining' for both rdev and
replacement rdev. However, if the read io fails, recovery_request_write()
returns without issuing the write io, in this case, end_sync_request()
is only called once and 'remaining' is leaked, cause an io hang.

Fix the problem by decreasing 'remaining' according to if 'bio' and
'repl_bio' is valid.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < cb827ed2bb34480dc102146d3a1f89fdbcafc028
Version 24afd80d99f80a79d8824d2805114b8b067e9823
Status affected
Version < 1d2c6c6e37fe5de11fd01a82badf03390e12df7a
Version 24afd80d99f80a79d8824d2805114b8b067e9823
Status affected
Version < 8c5d5d7ffd1e76734811b8ea5417cf0432b9952c
Version 24afd80d99f80a79d8824d2805114b8b067e9823
Status affected
Version < 1697fb124c6d6c5237e9cbd78890310154738084
Version 24afd80d99f80a79d8824d2805114b8b067e9823
Status affected
Version < 8d09065802c53cc938d162b62f6c4150b392c90e
Version 24afd80d99f80a79d8824d2805114b8b067e9823
Status affected
Version < 11141630f03efffdfe260b3582b2d93d38171b97
Version 24afd80d99f80a79d8824d2805114b8b067e9823
Status affected
Version < 3481dec5ecbbbbe44ab23e22c2b14bd65c644ec6
Version 24afd80d99f80a79d8824d2805114b8b067e9823
Status affected
Version < 4f82e7e07cdaf2947d71968e3d6b73370a217093
Version 24afd80d99f80a79d8824d2805114b8b067e9823
Status affected
Version < 26208a7cffd0c7cbf14237ccd20c7270b3ffeb7e
Version 24afd80d99f80a79d8824d2805114b8b067e9823
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 3.3
Status affected
Version < 3.3
Version 0
Status unaffected
Version <= 4.14.*
Version 4.14.315
Status unaffected
Version <= 4.19.*
Version 4.19.283
Status unaffected
Version <= 5.4.*
Version 5.4.243
Status unaffected
Version <= 5.10.*
Version 5.10.180
Status unaffected
Version <= 5.15.*
Version 5.15.111
Status unaffected
Version <= 6.1.*
Version 6.1.28
Status unaffected
Version <= 6.2.*
Version 6.2.15
Status unaffected
Version <= 6.3.*
Version 6.3.2
Status unaffected
Version <= *
Version 6.4
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.04% 0.126
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string