First published: Fri May 02 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: scsi: core: Fix a procfs host directory removal regression scsi_proc_hostdir_rm() decreases a reference counter and hence must only be called once per host that is removed. This change does not require a scsi_add_host_with_dma() change since scsi_add_host_with_dma() will return 0 (success) if scsi_proc_host_add() is called.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-53118 is classified as a high severity vulnerability due to the potential impact on the stability of the Linux kernel.
To fix CVE-2023-53118, ensure your Linux kernel is updated to the latest stable version that includes the patch for this vulnerability.
CVE-2023-53118 affects all versions of the Linux kernel that include the vulnerable scsi_proc_hostdir_rm() implementation.
The potential consequences of CVE-2023-53118 include system instability and possible denial-of-service conditions in environments utilizing SCSI devices.
Currently, the recommended approach for CVE-2023-53118 is to apply the security update, as workarounds could lead to further instability.