{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2023-53041","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2025-04-16T07:18:43.827Z","datePublished":"2025-05-02T15:54:59.210Z","dateUpdated":"2026-05-11T19:37:25.271Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T19:37:25.271Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Perform lockless command completion in abort path\n\nWhile adding and removing the controller, the following call trace was\nobserved:\n\nWARNING: CPU: 3 PID: 623596 at kernel/dma/mapping.c:532 dma_free_attrs+0x33/0x50\nCPU: 3 PID: 623596 Comm: sh Kdump: loaded Not tainted 5.14.0-96.el9.x86_64 #1\nRIP: 0010:dma_free_attrs+0x33/0x50\n\nCall Trace:\n   qla2x00_async_sns_sp_done+0x107/0x1b0 [qla2xxx]\n   qla2x00_abort_srb+0x8e/0x250 [qla2xxx]\n   ? ql_dbg+0x70/0x100 [qla2xxx]\n   __qla2x00_abort_all_cmds+0x108/0x190 [qla2xxx]\n   qla2x00_abort_all_cmds+0x24/0x70 [qla2xxx]\n   qla2x00_abort_isp_cleanup+0x305/0x3e0 [qla2xxx]\n   qla2x00_remove_one+0x364/0x400 [qla2xxx]\n   pci_device_remove+0x36/0xa0\n   __device_release_driver+0x17a/0x230\n   device_release_driver+0x24/0x30\n   pci_stop_bus_device+0x68/0x90\n   pci_stop_and_remove_bus_device_locked+0x16/0x30\n   remove_store+0x75/0x90\n   kernfs_fop_write_iter+0x11c/0x1b0\n   new_sync_write+0x11f/0x1b0\n   vfs_write+0x1eb/0x280\n   ksys_write+0x5f/0xe0\n   do_syscall_64+0x5c/0x80\n   ? do_user_addr_fault+0x1d8/0x680\n   ? do_syscall_64+0x69/0x80\n   ? exc_page_fault+0x62/0x140\n   ? asm_exc_page_fault+0x8/0x30\n   entry_SYSCALL_64_after_hwframe+0x44/0xae\n\nThe command was completed in the abort path during driver unload with a\nlock held, causing the warning in abort path. Hence complete the command\nwithout any lock held."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/scsi/qla2xxx/qla_os.c"],"versions":[{"version":"31c1f455203e56a3ce8d5dd92f37c83d07bd5bd5","lessThan":"9189f20b4c5307c0998682bb522e481b4567a8b8","status":"affected","versionType":"git"},{"version":"f45bca8c5052e8c59bab64ee90c44441678b9a52","lessThan":"231cfa78ec5badd84a1a2b09465bfad1a926aba1","status":"affected","versionType":"git"},{"version":"f45bca8c5052e8c59bab64ee90c44441678b9a52","lessThan":"d6f7377528d2abf338e504126e44439541be8f7d","status":"affected","versionType":"git"},{"version":"f45bca8c5052e8c59bab64ee90c44441678b9a52","lessThan":"cd0a1804ac5bab2545ac700c8d0fe9ae9284c567","status":"affected","versionType":"git"},{"version":"f45bca8c5052e8c59bab64ee90c44441678b9a52","lessThan":"415d614344a4f1bbddf55d724fc7eb9ef4b39aad","status":"affected","versionType":"git"},{"version":"f45bca8c5052e8c59bab64ee90c44441678b9a52","lessThan":"0367076b0817d5c75dfb83001ce7ce5c64d803a9","status":"affected","versionType":"git"},{"version":"10fd34ac79b234d9bd4459c9b9c1f9d5a67f7bde","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/scsi/qla2xxx/qla_os.c"],"versions":[{"version":"5.5","status":"affected"},{"version":"0","lessThan":"5.5","status":"unaffected","versionType":"semver"},{"version":"5.4.240","lessThanOrEqual":"5.4.*","status":"unaffected","versionType":"semver"},{"version":"5.10.177","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.105","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.22","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.2.9","lessThanOrEqual":"6.2.*","status":"unaffected","versionType":"semver"},{"version":"6.3","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.4.4","versionEndExcluding":"5.4.240"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.5","versionEndExcluding":"5.10.177"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.5","versionEndExcluding":"5.15.105"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.5","versionEndExcluding":"6.1.22"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.5","versionEndExcluding":"6.2.9"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.5","versionEndExcluding":"6.3"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.3.17"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/9189f20b4c5307c0998682bb522e481b4567a8b8"},{"url":"https://git.kernel.org/stable/c/231cfa78ec5badd84a1a2b09465bfad1a926aba1"},{"url":"https://git.kernel.org/stable/c/d6f7377528d2abf338e504126e44439541be8f7d"},{"url":"https://git.kernel.org/stable/c/cd0a1804ac5bab2545ac700c8d0fe9ae9284c567"},{"url":"https://git.kernel.org/stable/c/415d614344a4f1bbddf55d724fc7eb9ef4b39aad"},{"url":"https://git.kernel.org/stable/c/0367076b0817d5c75dfb83001ce7ce5c64d803a9"}],"title":"scsi: qla2xxx: Perform lockless command completion in abort path","x_generator":{"engine":"bippy-1.2.0"}}}}