CVE-2023-53078
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
02/05/2025
Last modified:
12/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
scsi: scsi_dh_alua: Fix memleak for &#39;qdata&#39; in alua_activate()<br />
<br />
If alua_rtpg_queue() failed from alua_activate(), then &#39;qdata&#39; is not<br />
freed, which will cause following memleak:<br />
<br />
unreferenced object 0xffff88810b2c6980 (size 32):<br />
comm "kworker/u16:2", pid 635322, jiffies 4355801099 (age 1216426.076s)<br />
hex dump (first 32 bytes):<br />
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................<br />
40 39 24 c1 ff ff ff ff 00 f8 ea 0a 81 88 ff ff @9$.............<br />
backtrace:<br />
[] alua_activate+0xb0/0x320<br />
[] scsi_dh_activate+0xb2/0x140<br />
[] activate_path_work+0xc6/0xe0 [dm_multipath]<br />
[] process_one_work+0x3c5/0x730<br />
[] worker_thread+0x93/0x650<br />
[] kthread+0x1ba/0x210<br />
[] ret_from_fork+0x22/0x30<br />
<br />
Fix the problem by freeing &#39;qdata&#39; in error path.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.9.21 (including) | 4.10 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.10.9 (including) | 4.11 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.11.1 (including) | 4.14.312 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.15 (including) | 4.19.280 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.20 (including) | 5.4.240 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.177 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.105 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.22 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.2.9 (excluding) |
| cpe:2.3:o:linux:linux_kernel:4.11:-:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:4.11:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:4.11:rc6:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:4.11:rc7:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:4.11:rc8:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.3:rc1:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/0d89254a4320eb7de0970c478172f764125c6355
- https://git.kernel.org/stable/c/123483df146492ca22b503ae6dacc2ce7c3a3974
- https://git.kernel.org/stable/c/1c55982beb80c7d3c30278fc6cfda8496a31dbe6
- https://git.kernel.org/stable/c/5c4d71424df34fc23dc5336d09394ce68c849542
- https://git.kernel.org/stable/c/9311e7a554dffd3823499e309a8b86a5cd1540e5
- https://git.kernel.org/stable/c/a13faca032acbf2699293587085293bdfaafc8ae
- https://git.kernel.org/stable/c/c09cdf6eb815ee35e55d6c50ac7f63db58bd20b8
- https://git.kernel.org/stable/c/c110051d335ef7f62ad33474b0c23997fee5bfb5



