Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: ublk: fail to recover device if queue setup is interrupted In ublk_ctrl_end_recovery(), if wait_for_completion_interruptible() is interrupted by signal, queues aren't setup successfully yet, so we have to fail UBLK_CMD_END_USER_RECOVERY, otherwise kernel oops can be triggered.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 6.1, < 6.1.43 |
References
- https://git.kernel.org/stable/c/0c0cbd4ebc375ceebc75c89df04b74f215fab23aPatch
- https://git.kernel.org/stable/c/84415f934ad4e96f3507fd09b831953d60fb04ecPatch
- https://git.kernel.org/stable/c/b3a1e243a74632f88b22e713f1c7256754017d58Patch
FAQ
What is CVE-2023-53207?
CVE-2023-53207 is a vulnerability with a CVSS score of 5.5 (MEDIUM). In the Linux kernel, the following vulnerability has been resolved: ublk: fail to recover device if queue setup is interrupted In ublk_ctrl_end_recovery(), if wait_for_completion_interruptible() is ...
How severe is CVE-2023-53207?
CVE-2023-53207 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-53207?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.