-

CVE-2023-53508

In the Linux kernel, the following vulnerability has been resolved:

ublk: fail to start device if queue setup is interrupted

In ublk_ctrl_start_dev(), if wait_for_completion_interruptible() is
interrupted by signal, queues aren't setup successfully yet, so we
have to fail UBLK_CMD_START_DEV, otherwise kernel oops can be triggered.

Reported by German when working on qemu-storage-deamon which requires
single thread ublk daemon.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < 0d5916c439574b18a0734872daa0022b3d6105ad
Version 71f28f3136aff5890cd56de78abc673f8393cad9
Status affected
Version < 6ab3e7d424cd413d7a5e976c8a30b4ffa84a65dd
Version 71f28f3136aff5890cd56de78abc673f8393cad9
Status affected
Version < 53e7d08f6d6e214c40db1f51291bb2975c789dc2
Version 71f28f3136aff5890cd56de78abc673f8393cad9
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 6.0
Status affected
Version < 6.0
Version 0
Status unaffected
Version <= 6.1.*
Version 6.1.43
Status unaffected
Version <= 6.4.*
Version 6.4.8
Status unaffected
Version <= *
Version 6.5
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.02% 0.044
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string