In the Linux kernel, the following vulnerability has been resolved:
ublk: fail to start device if queue setup is interrupted
In ublk_ctrl_start_dev(), if wait_for_completion_interruptible() is
interrupted by signal, queues aren't setup successfully yet, so we
have to fail UBLK_CMD_START_DEV, otherwise kernel oops can be triggered.
Reported by German when working on qemu-storage-deamon which requires
single thread ublk daemon.
References
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2025-10-01 12:15
Updated : 2026-01-23 01:59
NVD link : CVE-2023-53508
Mitre link : CVE-2023-53508
CVE.ORG link : CVE-2023-53508
JSON object : View
Products Affected
linux
- linux_kernel
CWE
