-
CVE-2023-53615
- EPSS 0.02%
- Veröffentlicht 04.10.2025 15:44:22
- Zuletzt bearbeitet 06.10.2025 14:56:21
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- Teams Watchlist Login
- Unerledigt Login
In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Fix deletion race condition System crash when using debug kernel due to link list corruption. The cause of the link list corruption is due to session deletion was allowed to queue up twice. Here's the internal trace that show the same port was allowed to double queue for deletion on different cpu. 20808683956 015 qla2xxx [0000:13:00.1]-e801:4: Scheduling sess ffff93ebf9306800 for deletion 50:06:0e:80:12:48:ff:50 fc4_type 1 20808683957 027 qla2xxx [0000:13:00.1]-e801:4: Scheduling sess ffff93ebf9306800 for deletion 50:06:0e:80:12:48:ff:50 fc4_type 1 Move the clearing/setting of deleted flag lock.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
a4628a5b98e4c6d905e1f7638242612d7db7d9c2
Version
726b85487067d7f5b23495bc33c484b8517c4074
Status
affected
Version <
4d7da12483e98c451a51bd294a3d3494f0aee5eb
Version
726b85487067d7f5b23495bc33c484b8517c4074
Status
affected
Version <
f1ea164be545629bf442c22f508ad9e7b94ac100
Version
726b85487067d7f5b23495bc33c484b8517c4074
Status
affected
Version <
cd06c45b326e44f0d21dc1b3fa23e71f46847e28
Version
726b85487067d7f5b23495bc33c484b8517c4074
Status
affected
Version <
b05017cb4ff75eea783583f3d400059507510ab1
Version
726b85487067d7f5b23495bc33c484b8517c4074
Status
affected
Version <
6dfe4344c168c6ca20fe7640649aacfcefcccb26
Version
726b85487067d7f5b23495bc33c484b8517c4074
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
4.11
Status
affected
Version <
4.11
Version
0
Status
unaffected
Version <=
5.4.*
Version
5.4.258
Status
unaffected
Version <=
5.10.*
Version
5.10.195
Status
unaffected
Version <=
5.15.*
Version
5.15.132
Status
unaffected
Version <=
6.1.*
Version
6.1.54
Status
unaffected
Version <=
6.5.*
Version
6.5.4
Status
unaffected
Version <=
*
Version
6.6
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.02% | 0.053 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|