We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2023-53078

scsi: scsi_dh_alua: Fix memleak for 'qdata' in alua_activate()



Description

In the Linux kernel, the following vulnerability has been resolved: scsi: scsi_dh_alua: Fix memleak for 'qdata' in alua_activate() If alua_rtpg_queue() failed from alua_activate(), then 'qdata' is not freed, which will cause following memleak: unreferenced object 0xffff88810b2c6980 (size 32): comm "kworker/u16:2", pid 635322, jiffies 4355801099 (age 1216426.076s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 40 39 24 c1 ff ff ff ff 00 f8 ea 0a 81 88 ff ff @9$............. backtrace: [<0000000098f3a26d>] alua_activate+0xb0/0x320 [<000000003b529641>] scsi_dh_activate+0xb2/0x140 [<000000007b296db3>] activate_path_work+0xc6/0xe0 [dm_multipath] [<000000007adc9ace>] process_one_work+0x3c5/0x730 [<00000000c457a985>] worker_thread+0x93/0x650 [<00000000cb80e628>] kthread+0x1ba/0x210 [<00000000a1e61077>] ret_from_fork+0x22/0x30 Fix the problem by freeing 'qdata' in error path.

Reserved 2025-05-02 | Published 2025-05-02 | Updated 2025-05-04 | Assigner Linux

Product status

Default status
unaffected

625fe857e4fac6518716f3c0ff5e5deb8ec6d238 before 123483df146492ca22b503ae6dacc2ce7c3a3974
affected

625fe857e4fac6518716f3c0ff5e5deb8ec6d238 before c110051d335ef7f62ad33474b0c23997fee5bfb5
affected

625fe857e4fac6518716f3c0ff5e5deb8ec6d238 before 5c4d71424df34fc23dc5336d09394ce68c849542
affected

625fe857e4fac6518716f3c0ff5e5deb8ec6d238 before c09cdf6eb815ee35e55d6c50ac7f63db58bd20b8
affected

625fe857e4fac6518716f3c0ff5e5deb8ec6d238 before 9311e7a554dffd3823499e309a8b86a5cd1540e5
affected

625fe857e4fac6518716f3c0ff5e5deb8ec6d238 before 1c55982beb80c7d3c30278fc6cfda8496a31dbe6
affected

625fe857e4fac6518716f3c0ff5e5deb8ec6d238 before 0d89254a4320eb7de0970c478172f764125c6355
affected

625fe857e4fac6518716f3c0ff5e5deb8ec6d238 before a13faca032acbf2699293587085293bdfaafc8ae
affected

68b275b7cbf065a8ea9b964cbb7d78d2b63c635f
affected

2b1725d1df362499f6bbd5a7e245a4090b29c2bb
affected

Default status
affected

4.11
affected

Any version before 4.11
unaffected

4.14.312
unaffected

4.19.280
unaffected

5.4.240
unaffected

5.10.177
unaffected

5.15.105
unaffected

6.1.22
unaffected

6.2.9
unaffected

6.3
unaffected

References

git.kernel.org/...c/123483df146492ca22b503ae6dacc2ce7c3a3974

git.kernel.org/...c/c110051d335ef7f62ad33474b0c23997fee5bfb5

git.kernel.org/...c/5c4d71424df34fc23dc5336d09394ce68c849542

git.kernel.org/...c/c09cdf6eb815ee35e55d6c50ac7f63db58bd20b8

git.kernel.org/...c/9311e7a554dffd3823499e309a8b86a5cd1540e5

git.kernel.org/...c/1c55982beb80c7d3c30278fc6cfda8496a31dbe6

git.kernel.org/...c/0d89254a4320eb7de0970c478172f764125c6355

git.kernel.org/...c/a13faca032acbf2699293587085293bdfaafc8ae

cve.org (CVE-2023-53078)

nvd.nist.gov (CVE-2023-53078)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2023-53078

Support options

Helpdesk Chat, Email, Knowledgebase