CVE-2023-53586
BaseFortify
Publication date: 2025-10-04
Last updated on: 2026-03-23
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 6.3 (inc) to 6.3.2 (exc) |
| linux | linux_kernel | From 6.2 (inc) to 6.2.15 (exc) |
| linux | linux_kernel | From 5.16 (inc) to 6.1.28 (exc) |
| linux | linux_kernel | From 5.11 (inc) to 5.15.111 (exc) |
| linux | linux_kernel | From 4.11 (inc) to 5.10.180 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-415 | The product calls free() twice on the same memory address. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a bug in the Linux kernel's SCSI target layer related to handling multiple LUN_RESET commands across different sessions. When two sessions send LUN_RESET commands simultaneously, one session's reset moves running commands to a local list, causing the other session's reset to incorrectly believe all commands are cleaned up. This leads the initiator to mistakenly restart commands that are still running, resulting in errors such as invalid ITT errors or task lookup failures. The bug was introduced by a specific commit and fixed by reverting that commit and serializing LUN_RESET executions to prevent deadlocks.
How can this vulnerability impact me? :
This vulnerability can cause the initiator to incorrectly assume that running commands have been cleaned up after a LUN_RESET, leading to the restarting of commands that are still active. This can result in errors such as invalid ITT errors or accidental lookup of new tasks if ITT values have been reallocated. Ultimately, this can cause command processing errors and instability in SCSI target operations.