{"uuid": "71f53ecc-0b97-46ab-8199-a70eddee22b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-53140", "type": "seen", "source": "https://t.me/cvedetector/24362", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2023-53140 - \"Linux Kernel SCSI Core /proc/scsi Directory Removal Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2023-53140 \nPublished : May 2, 2025, 4:15 p.m. | 1\u00a0hour, 4\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nscsi: core: Remove the /proc/scsi/${proc_name} directory earlier  \n  \nRemove the /proc/scsi/${proc_name} directory earlier to fix a race  \ncondition between unloading and reloading kernel modules. This fixes a bug  \nintroduced in 2009 by commit 77c019768f06 (\"[SCSI] fix /proc memory leak in  \nthe SCSI core\").  \n  \nFix the following kernel warning:  \n  \nproc_dir_entry 'scsi/scsi_debug' already registered  \nWARNING: CPU: 19 PID: 27986 at fs/proc/generic.c:376 proc_register+0x27d/0x2e0  \nCall Trace:  \n proc_mkdir+0xb5/0xe0  \n scsi_proc_hostdir_add+0xb5/0x170  \n scsi_host_alloc+0x683/0x6c0  \n sdebug_driver_probe+0x6b/0x2d0 [scsi_debug]  \n really_probe+0x159/0x540  \n __driver_probe_device+0xdc/0x230  \n driver_probe_device+0x4f/0x120  \n __device_attach_driver+0xef/0x180  \n bus_for_each_drv+0xe5/0x130  \n __device_attach+0x127/0x290  \n device_initial_probe+0x17/0x20  \n bus_probe_device+0x110/0x130  \n device_add+0x673/0xc80  \n device_register+0x1e/0x30  \n sdebug_add_host_helper+0x1a7/0x3b0 [scsi_debug]  \n scsi_debug_init+0x64f/0x1000 [scsi_debug]  \n do_one_initcall+0xd7/0x470  \n do_init_module+0xe7/0x330  \n load_module+0x122a/0x12c0  \n __do_sys_finit_module+0x124/0x1a0  \n __x64_sys_finit_module+0x46/0x50  \n do_syscall_64+0x38/0x80  \n entry_SYSCALL_64_after_hwframe+0x46/0xb0 \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-02T20:07:49.000000Z"}