CVE-2023-53508
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
01/10/2025
Última modificación:
02/10/2025
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
ublk: fail to start device if queue setup is interrupted<br />
<br />
In ublk_ctrl_start_dev(), if wait_for_completion_interruptible() is<br />
interrupted by signal, queues aren&#39;t setup successfully yet, so we<br />
have to fail UBLK_CMD_START_DEV, otherwise kernel oops can be triggered.<br />
<br />
Reported by German when working on qemu-storage-deamon which requires<br />
single thread ublk daemon.



