First published: Thu Nov 21 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: nvme-multipath: defer partition scanning We need to suppress the partition scan from occuring within the controller's scan_work context. If a path error occurs here, the IO will wait until a path becomes available or all paths are torn down, but that action also occurs within scan_work, so it would deadlock. Defer the partion scan to a different context that does not block scan_work.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <6.1.118 | |
Linux Kernel | >=6.2<6.6.62 | |
Linux Kernel | >=6.7<6.11.9 | |
Linux Kernel | =6.12-rc1 | |
Linux Kernel | =6.12-rc2 | |
Linux Kernel | =6.12-rc3 | |
debian/linux | <=5.10.223-1<=5.10.234-1 | 6.1.129-1 6.1.133-1 6.12.22-1 |
debian/linux-6.1 | 6.1.129-1~deb11u1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-53093 has been classified as a moderate severity vulnerability in the Linux kernel.
To mitigate the effects of CVE-2024-53093, users should update their Linux kernel to version 6.1.119 or later.
CVE-2024-53093 affects Linux kernel versions up to 6.1.118 and from 6.2 to 6.6.62, including multiple release candidates.
The vulnerability can cause IO operations to wait indefinitely for path availability, potentially degrading system performance during path errors.
There are no documented workarounds for CVE-2024-53093, and updating the kernel is the recommended action.