
Cloud Vulnerability DB
A community-led vulnerabilities database
In the Linux kernel, a vulnerability (CVE-2023-53609) has been identified and resolved that affects the SCSI subsystem. The issue involves the atomic increment operation of the iorequestcnt in the scsiqueuerq() function, which could cause a kernel panic due to potential use-after-free condition when cmd->device may be freed after returning from scsidispatch_cmd(). This vulnerability required reverting the commit cfee29ffb45b1c9798011b19d454637d1b0fe87d (NVD).
The vulnerability stems from a race condition in the SCSI subsystem where the atomicinc(&cmd->device->iorequestcnt) operation in scsiqueuerq() could lead to a use-after-free scenario. Specifically, the device pointer may be freed after scsidispatchcmd() returns, but the code still attempts to access it, resulting in a kernel panic. The issue was significant enough to warrant reverting a previous commit that introduced this behavior (NVD).
When exploited, this vulnerability can cause a kernel panic, leading to system instability and potential denial of service conditions. The impact primarily affects systems utilizing the SCSI subsystem in the Linux kernel (NVD).
The vulnerability has been addressed by reverting the problematic commit (cfee29ffb45b1c9798011b19d454637d1b0fe87d) that introduced the issue. Users should update to the patched version of the Linux kernel to resolve this vulnerability (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."