
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability has been identified in the Linux kernel's SCSI subsystem, specifically in the qla2xxx driver, tracked as CVE-2023-53615. The issue involves a deletion race condition that can lead to system crashes when using debug kernel due to link list corruption. The vulnerability was discovered when session deletion was allowed to queue up twice on different CPUs (NVD).
The vulnerability manifests as a race condition in the qla2xxx driver where the same port was allowed to double queue for deletion on different CPUs. This is evidenced by internal traces showing identical deletion scheduling for the same session (ffff93ebf9306800) with fc4_type 1 occurring at timestamps 20808683956 and 20808683957 on different CPU cores. The issue stems from improper handling of the deleted flag lock (NVD).
When exploited, this vulnerability can cause system crashes in debug kernel environments due to link list corruption. The primary impact is on system stability and availability, particularly affecting systems using the qla2xxx SCSI driver (NVD).
The vulnerability has been resolved by moving the clearing/setting of the deleted flag lock. The fix prevents the double queueing of session deletions by implementing proper locking mechanisms (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."