CVE-2023-53508

HIGH

Linux Kernel - Unknown Vuln

Title source: llm

Description

In the Linux kernel, the following vulnerability has been resolved: ublk: fail to start device if queue setup is interrupted In ublk_ctrl_start_dev(), if wait_for_completion_interruptible() is interrupted by signal, queues aren't setup successfully yet, so we have to fail UBLK_CMD_START_DEV, otherwise kernel oops can be triggered. Reported by German when working on qemu-storage-deamon which requires single thread ublk daemon.

Scores

CVSS v3 7.8
EPSS 0.0001
EPSS Percentile 1.8%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Classification

Status published

Affected Products (4)

linux/linux_kernel < 6.1.43
linux/linux_kernel
linux/linux_kernel
linux/linux_kernel

Timeline

Published Oct 01, 2025
Tracked Since Feb 18, 2026