We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2023-53140

scsi: core: Remove the /proc/scsi/${proc_name} directory earlier



Description

In the Linux kernel, the following vulnerability has been resolved: scsi: core: Remove the /proc/scsi/${proc_name} directory earlier Remove the /proc/scsi/${proc_name} directory earlier to fix a race condition between unloading and reloading kernel modules. This fixes a bug introduced in 2009 by commit 77c019768f06 ("[SCSI] fix /proc memory leak in the SCSI core"). Fix the following kernel warning: proc_dir_entry 'scsi/scsi_debug' already registered WARNING: CPU: 19 PID: 27986 at fs/proc/generic.c:376 proc_register+0x27d/0x2e0 Call Trace: proc_mkdir+0xb5/0xe0 scsi_proc_hostdir_add+0xb5/0x170 scsi_host_alloc+0x683/0x6c0 sdebug_driver_probe+0x6b/0x2d0 [scsi_debug] really_probe+0x159/0x540 __driver_probe_device+0xdc/0x230 driver_probe_device+0x4f/0x120 __device_attach_driver+0xef/0x180 bus_for_each_drv+0xe5/0x130 __device_attach+0x127/0x290 device_initial_probe+0x17/0x20 bus_probe_device+0x110/0x130 device_add+0x673/0xc80 device_register+0x1e/0x30 sdebug_add_host_helper+0x1a7/0x3b0 [scsi_debug] scsi_debug_init+0x64f/0x1000 [scsi_debug] do_one_initcall+0xd7/0x470 do_init_module+0xe7/0x330 load_module+0x122a/0x12c0 __do_sys_finit_module+0x124/0x1a0 __x64_sys_finit_module+0x46/0x50 do_syscall_64+0x38/0x80 entry_SYSCALL_64_after_hwframe+0x46/0xb0

Reserved 2025-05-02 | Published 2025-05-02 | Updated 2025-05-04 | Assigner Linux

Product status

Default status
unaffected

77c019768f0607c36e25bec11ce3e1eabef09277 before 13daafe1e209b03e9bda16ff2bd2b2da145a139b
affected

77c019768f0607c36e25bec11ce3e1eabef09277 before 891a3cba425cf483d96facca55aebd6ff1da4338
affected

77c019768f0607c36e25bec11ce3e1eabef09277 before 6b223e32d66ca9db1f252f433514783d8b22a8e1
affected

77c019768f0607c36e25bec11ce3e1eabef09277 before e471e928de97b00f297ad1015cc14f9459765713
affected

77c019768f0607c36e25bec11ce3e1eabef09277 before 17e98a5ede81b7696bec421f7afa2dfe467f5e6b
affected

77c019768f0607c36e25bec11ce3e1eabef09277 before 1ec363599f8346d5a8d08c71a0d9860d6c420ec0
affected

77c019768f0607c36e25bec11ce3e1eabef09277 before fc663711b94468f4e1427ebe289c9f05669699c9
affected

Default status
affected

2.6.30
affected

Any version before 2.6.30
unaffected

4.19.278
unaffected

5.4.237
unaffected

5.10.175
unaffected

5.15.103
unaffected

6.1.20
unaffected

6.2.7
unaffected

6.3
unaffected

References

git.kernel.org/...c/13daafe1e209b03e9bda16ff2bd2b2da145a139b

git.kernel.org/...c/891a3cba425cf483d96facca55aebd6ff1da4338

git.kernel.org/...c/6b223e32d66ca9db1f252f433514783d8b22a8e1

git.kernel.org/...c/e471e928de97b00f297ad1015cc14f9459765713

git.kernel.org/...c/17e98a5ede81b7696bec421f7afa2dfe467f5e6b

git.kernel.org/...c/1ec363599f8346d5a8d08c71a0d9860d6c420ec0

git.kernel.org/...c/fc663711b94468f4e1427ebe289c9f05669699c9

cve.org (CVE-2023-53140)

nvd.nist.gov (CVE-2023-53140)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2023-53140

Support options

Helpdesk Chat, Email, Knowledgebase