๐Ÿ” CVE Alert

CVE-2023-53508

UNKNOWN 0.0

ublk: fail to start device if queue setup is interrupted

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: ublk: fail to start device if queue setup is interrupted In ublk_ctrl_start_dev(), if wait_for_completion_interruptible() is interrupted by signal, queues aren't setup successfully yet, so we have to fail UBLK_CMD_START_DEV, otherwise kernel oops can be triggered. Reported by German when working on qemu-storage-deamon which requires single thread ublk daemon.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Oct 1, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
71f28f3136aff5890cd56de78abc673f8393cad9 < 0d5916c439574b18a0734872daa0022b3d6105ad 71f28f3136aff5890cd56de78abc673f8393cad9 < 6ab3e7d424cd413d7a5e976c8a30b4ffa84a65dd 71f28f3136aff5890cd56de78abc673f8393cad9 < 53e7d08f6d6e214c40db1f51291bb2975c789dc2
Linux / Linux
6.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/0d5916c439574b18a0734872daa0022b3d6105ad git.kernel.org: https://git.kernel.org/stable/c/6ab3e7d424cd413d7a5e976c8a30b4ffa84a65dd git.kernel.org: https://git.kernel.org/stable/c/53e7d08f6d6e214c40db1f51291bb2975c789dc2