-
CVE-2023-53299
- EPSS 0.04%
- Veröffentlicht 16.09.2025 08:11:30
- Zuletzt bearbeitet 16.09.2025 12:49:16
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- Teams Watchlist Login
- Unerledigt Login
In the Linux kernel, the following vulnerability has been resolved: md/raid10: fix leak of 'r10bio->remaining' for recovery raid10_sync_request() will add 'r10bio->remaining' for both rdev and replacement rdev. However, if the read io fails, recovery_request_write() returns without issuing the write io, in this case, end_sync_request() is only called once and 'remaining' is leaked, cause an io hang. Fix the problem by decreasing 'remaining' according to if 'bio' and 'repl_bio' is valid.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
cb827ed2bb34480dc102146d3a1f89fdbcafc028
Version
24afd80d99f80a79d8824d2805114b8b067e9823
Status
affected
Version <
1d2c6c6e37fe5de11fd01a82badf03390e12df7a
Version
24afd80d99f80a79d8824d2805114b8b067e9823
Status
affected
Version <
8c5d5d7ffd1e76734811b8ea5417cf0432b9952c
Version
24afd80d99f80a79d8824d2805114b8b067e9823
Status
affected
Version <
1697fb124c6d6c5237e9cbd78890310154738084
Version
24afd80d99f80a79d8824d2805114b8b067e9823
Status
affected
Version <
8d09065802c53cc938d162b62f6c4150b392c90e
Version
24afd80d99f80a79d8824d2805114b8b067e9823
Status
affected
Version <
11141630f03efffdfe260b3582b2d93d38171b97
Version
24afd80d99f80a79d8824d2805114b8b067e9823
Status
affected
Version <
3481dec5ecbbbbe44ab23e22c2b14bd65c644ec6
Version
24afd80d99f80a79d8824d2805114b8b067e9823
Status
affected
Version <
4f82e7e07cdaf2947d71968e3d6b73370a217093
Version
24afd80d99f80a79d8824d2805114b8b067e9823
Status
affected
Version <
26208a7cffd0c7cbf14237ccd20c7270b3ffeb7e
Version
24afd80d99f80a79d8824d2805114b8b067e9823
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
3.3
Status
affected
Version <
3.3
Version
0
Status
unaffected
Version <=
4.14.*
Version
4.14.315
Status
unaffected
Version <=
4.19.*
Version
4.19.283
Status
unaffected
Version <=
5.4.*
Version
5.4.243
Status
unaffected
Version <=
5.10.*
Version
5.10.180
Status
unaffected
Version <=
5.15.*
Version
5.15.111
Status
unaffected
Version <=
6.1.*
Version
6.1.28
Status
unaffected
Version <=
6.2.*
Version
6.2.15
Status
unaffected
Version <=
6.3.*
Version
6.3.2
Status
unaffected
Version <=
*
Version
6.4
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.04% | 0.126 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|