CVE-2023-53041

Source
https://cve.org/CVERecord?id=CVE-2023-53041
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53041.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-53041
Downstream
Related
Published
2025-05-02T15:54:59.210Z
Modified
2026-04-11T12:46:40.197350Z
Summary
scsi: qla2xxx: Perform lockless command completion in abort path
Details

In the Linux kernel, the following vulnerability has been resolved:

scsi: qla2xxx: Perform lockless command completion in abort path

While adding and removing the controller, the following call trace was observed:

WARNING: CPU: 3 PID: 623596 at kernel/dma/mapping.c:532 dmafreeattrs+0x33/0x50 CPU: 3 PID: 623596 Comm: sh Kdump: loaded Not tainted 5.14.0-96.el9.x8664 #1 RIP: 0010:dmafree_attrs+0x33/0x50

Call Trace: qla2x00asyncsnsspdone+0x107/0x1b0 [qla2xxx] qla2x00abortsrb+0x8e/0x250 [qla2xxx] ? ql_dbg+0x70/0x100 [qla2xxx] __qla2x00abortallcmds+0x108/0x190 [qla2xxx] qla2x00abortallcmds+0x24/0x70 [qla2xxx] qla2x00abortispcleanup+0x305/0x3e0 [qla2xxx] qla2x00removeone+0x364/0x400 [qla2xxx] pcidevice_remove+0x36/0xa0 _devicereleasedriver+0x17a/0x230 devicereleasedriver+0x24/0x30 pcistopbusdevice+0x68/0x90 pcistopandremovebusdevicelocked+0x16/0x30 removestore+0x75/0x90 kernfsfopwriteiter+0x11c/0x1b0 newsyncwrite+0x11f/0x1b0 vfswrite+0x1eb/0x280 ksyswrite+0x5f/0xe0 dosyscall64+0x5c/0x80 ? douseraddrfault+0x1d8/0x680 ? dosyscall64+0x69/0x80 ? excpagefault+0x62/0x140 ? asmexcpagefault+0x8/0x30 entrySYSCALL64afterhwframe+0x44/0xae

The command was completed in the abort path during driver unload with a lock held, causing the warning in abort path. Hence complete the command without any lock held.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53041.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
31c1f455203e56a3ce8d5dd92f37c83d07bd5bd5
Fixed
9189f20b4c5307c0998682bb522e481b4567a8b8
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
f45bca8c5052e8c59bab64ee90c44441678b9a52
Fixed
231cfa78ec5badd84a1a2b09465bfad1a926aba1
Fixed
d6f7377528d2abf338e504126e44439541be8f7d
Fixed
cd0a1804ac5bab2545ac700c8d0fe9ae9284c567
Fixed
415d614344a4f1bbddf55d724fc7eb9ef4b39aad
Fixed
0367076b0817d5c75dfb83001ce7ce5c64d803a9
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
10fd34ac79b234d9bd4459c9b9c1f9d5a67f7bde

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53041.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.4.240
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.177
Fixed
5.15.105
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
6.1.22
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.2.9

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53041.json"