-

CVE-2023-53615

In the Linux kernel, the following vulnerability has been resolved:

scsi: qla2xxx: Fix deletion race condition

System crash when using debug kernel due to link list corruption. The cause
of the link list corruption is due to session deletion was allowed to queue
up twice.  Here's the internal trace that show the same port was allowed to
double queue for deletion on different cpu.

20808683956 015 qla2xxx [0000:13:00.1]-e801:4: Scheduling sess ffff93ebf9306800 for deletion 50:06:0e:80:12:48:ff:50 fc4_type 1
20808683957 027 qla2xxx [0000:13:00.1]-e801:4: Scheduling sess ffff93ebf9306800 for deletion 50:06:0e:80:12:48:ff:50 fc4_type 1

Move the clearing/setting of deleted flag lock.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < a4628a5b98e4c6d905e1f7638242612d7db7d9c2
Version 726b85487067d7f5b23495bc33c484b8517c4074
Status affected
Version < 4d7da12483e98c451a51bd294a3d3494f0aee5eb
Version 726b85487067d7f5b23495bc33c484b8517c4074
Status affected
Version < f1ea164be545629bf442c22f508ad9e7b94ac100
Version 726b85487067d7f5b23495bc33c484b8517c4074
Status affected
Version < cd06c45b326e44f0d21dc1b3fa23e71f46847e28
Version 726b85487067d7f5b23495bc33c484b8517c4074
Status affected
Version < b05017cb4ff75eea783583f3d400059507510ab1
Version 726b85487067d7f5b23495bc33c484b8517c4074
Status affected
Version < 6dfe4344c168c6ca20fe7640649aacfcefcccb26
Version 726b85487067d7f5b23495bc33c484b8517c4074
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 4.11
Status affected
Version < 4.11
Version 0
Status unaffected
Version <= 5.4.*
Version 5.4.258
Status unaffected
Version <= 5.10.*
Version 5.10.195
Status unaffected
Version <= 5.15.*
Version 5.15.132
Status unaffected
Version <= 6.1.*
Version 6.1.54
Status unaffected
Version <= 6.5.*
Version 6.5.4
Status unaffected
Version <= *
Version 6.6
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.02% 0.053
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String