Home

Description

In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Wait for io return on terminate rport System crash due to use after free. Current code allows terminate_rport_io to exit before making sure all IOs has returned. For FCP-2 device, IO's can hang on in HW because driver has not tear down the session in FW at first sign of cable pull. When dev_loss_tmo timer pops, terminate_rport_io is called and upper layer is about to free various resources. Terminate_rport_io trigger qla to do the final cleanup, but the cleanup might not be fast enough where it leave qla still holding on to the same resource. Wait for IO's to return to upper layer before resources are freed.

PUBLISHED Reserved 2025-09-16 | Published 2025-09-16 | Updated 2025-09-16 | Assigner Linux

Product status

Default status
unaffected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 8a55556cd7e0220486163b1285ce11a8be2ce5fa
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 4647d2e88918a078359d1532d90c417a38542c9e
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before d25fded78d88e1515439b3ba581684d683e0b6ab
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before a9fe97fb7b4ee21bffb76f2acb05769bad27ae70
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 079c8264ed9fea8cbcac01ad29040f901cbc3692
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 90770dad1eb30967ebd8d37d82830bcf270b3293
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 5bcdaafd92be6035ddc77fa76650cf9dd5b864c4
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before fc0cba0c7be8261a1625098bd1d695077ec621c9
affected

Default status
affected

4.14.322 (semver)
unaffected

4.19.291 (semver)
unaffected

5.4.251 (semver)
unaffected

5.10.188 (semver)
unaffected

5.15.121 (semver)
unaffected

6.1.40 (semver)
unaffected

6.4.5 (semver)
unaffected

6.5 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/8a55556cd7e0220486163b1285ce11a8be2ce5fa

git.kernel.org/...c/4647d2e88918a078359d1532d90c417a38542c9e

git.kernel.org/...c/d25fded78d88e1515439b3ba581684d683e0b6ab

git.kernel.org/...c/a9fe97fb7b4ee21bffb76f2acb05769bad27ae70

git.kernel.org/...c/079c8264ed9fea8cbcac01ad29040f901cbc3692

git.kernel.org/...c/90770dad1eb30967ebd8d37d82830bcf270b3293

git.kernel.org/...c/5bcdaafd92be6035ddc77fa76650cf9dd5b864c4

git.kernel.org/...c/fc0cba0c7be8261a1625098bd1d695077ec621c9

cve.org (CVE-2023-53322)

nvd.nist.gov (CVE-2023-53322)

Download JSON