๐Ÿ” CVE Alert

CVE-2023-53140

UNKNOWN 0.0

scsi: core: Remove the /proc/scsi/${proc_name} directory earlier

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: scsi: core: Remove the /proc/scsi/${proc_name} directory earlier Remove the /proc/scsi/${proc_name} directory earlier to fix a race condition between unloading and reloading kernel modules. This fixes a bug introduced in 2009 by commit 77c019768f06 ("[SCSI] fix /proc memory leak in the SCSI core"). Fix the following kernel warning: proc_dir_entry 'scsi/scsi_debug' already registered WARNING: CPU: 19 PID: 27986 at fs/proc/generic.c:376 proc_register+0x27d/0x2e0 Call Trace: proc_mkdir+0xb5/0xe0 scsi_proc_hostdir_add+0xb5/0x170 scsi_host_alloc+0x683/0x6c0 sdebug_driver_probe+0x6b/0x2d0 [scsi_debug] really_probe+0x159/0x540 __driver_probe_device+0xdc/0x230 driver_probe_device+0x4f/0x120 __device_attach_driver+0xef/0x180 bus_for_each_drv+0xe5/0x130 __device_attach+0x127/0x290 device_initial_probe+0x17/0x20 bus_probe_device+0x110/0x130 device_add+0x673/0xc80 device_register+0x1e/0x30 sdebug_add_host_helper+0x1a7/0x3b0 [scsi_debug] scsi_debug_init+0x64f/0x1000 [scsi_debug] do_one_initcall+0xd7/0x470 do_init_module+0xe7/0x330 load_module+0x122a/0x12c0 __do_sys_finit_module+0x124/0x1a0 __x64_sys_finit_module+0x46/0x50 do_syscall_64+0x38/0x80 entry_SYSCALL_64_after_hwframe+0x46/0xb0

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published May 2, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
77c019768f0607c36e25bec11ce3e1eabef09277 < 13daafe1e209b03e9bda16ff2bd2b2da145a139b 77c019768f0607c36e25bec11ce3e1eabef09277 < 891a3cba425cf483d96facca55aebd6ff1da4338 77c019768f0607c36e25bec11ce3e1eabef09277 < 6b223e32d66ca9db1f252f433514783d8b22a8e1 77c019768f0607c36e25bec11ce3e1eabef09277 < e471e928de97b00f297ad1015cc14f9459765713 77c019768f0607c36e25bec11ce3e1eabef09277 < 17e98a5ede81b7696bec421f7afa2dfe467f5e6b 77c019768f0607c36e25bec11ce3e1eabef09277 < 1ec363599f8346d5a8d08c71a0d9860d6c420ec0 77c019768f0607c36e25bec11ce3e1eabef09277 < fc663711b94468f4e1427ebe289c9f05669699c9
Linux / Linux
2.6.30

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/13daafe1e209b03e9bda16ff2bd2b2da145a139b git.kernel.org: https://git.kernel.org/stable/c/891a3cba425cf483d96facca55aebd6ff1da4338 git.kernel.org: https://git.kernel.org/stable/c/6b223e32d66ca9db1f252f433514783d8b22a8e1 git.kernel.org: https://git.kernel.org/stable/c/e471e928de97b00f297ad1015cc14f9459765713 git.kernel.org: https://git.kernel.org/stable/c/17e98a5ede81b7696bec421f7afa2dfe467f5e6b git.kernel.org: https://git.kernel.org/stable/c/1ec363599f8346d5a8d08c71a0d9860d6c420ec0 git.kernel.org: https://git.kernel.org/stable/c/fc663711b94468f4e1427ebe289c9f05669699c9