Home

Description

In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Fix deletion race condition System crash when using debug kernel due to link list corruption. The cause of the link list corruption is due to session deletion was allowed to queue up twice. Here's the internal trace that show the same port was allowed to double queue for deletion on different cpu. 20808683956 015 qla2xxx [0000:13:00.1]-e801:4: Scheduling sess ffff93ebf9306800 for deletion 50:06:0e:80:12:48:ff:50 fc4_type 1 20808683957 027 qla2xxx [0000:13:00.1]-e801:4: Scheduling sess ffff93ebf9306800 for deletion 50:06:0e:80:12:48:ff:50 fc4_type 1 Move the clearing/setting of deleted flag lock.

PUBLISHED Reserved 2025-10-04 | Published 2025-10-04 | Updated 2025-10-04 | Assigner Linux

Product status

Default status
unaffected

726b85487067d7f5b23495bc33c484b8517c4074 before a4628a5b98e4c6d905e1f7638242612d7db7d9c2
affected

726b85487067d7f5b23495bc33c484b8517c4074 before 4d7da12483e98c451a51bd294a3d3494f0aee5eb
affected

726b85487067d7f5b23495bc33c484b8517c4074 before f1ea164be545629bf442c22f508ad9e7b94ac100
affected

726b85487067d7f5b23495bc33c484b8517c4074 before cd06c45b326e44f0d21dc1b3fa23e71f46847e28
affected

726b85487067d7f5b23495bc33c484b8517c4074 before b05017cb4ff75eea783583f3d400059507510ab1
affected

726b85487067d7f5b23495bc33c484b8517c4074 before 6dfe4344c168c6ca20fe7640649aacfcefcccb26
affected

Default status
affected

4.11
affected

Any version before 4.11
unaffected

5.4.258
unaffected

5.10.195
unaffected

5.15.132
unaffected

6.1.54
unaffected

6.5.4
unaffected

6.6
unaffected

References

git.kernel.org/...c/a4628a5b98e4c6d905e1f7638242612d7db7d9c2

git.kernel.org/...c/4d7da12483e98c451a51bd294a3d3494f0aee5eb

git.kernel.org/...c/f1ea164be545629bf442c22f508ad9e7b94ac100

git.kernel.org/...c/cd06c45b326e44f0d21dc1b3fa23e71f46847e28

git.kernel.org/...c/b05017cb4ff75eea783583f3d400059507510ab1

git.kernel.org/...c/6dfe4344c168c6ca20fe7640649aacfcefcccb26

cve.org (CVE-2023-53615)

nvd.nist.gov (CVE-2023-53615)

Download JSON