{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2023-53696","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2025-10-22T13:21:37.344Z","datePublished":"2025-10-22T13:23:37.110Z","dateUpdated":"2026-05-11T19:50:06.289Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T19:50:06.289Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Fix memory leak in qla2x00_probe_one()\n\nThere is a memory leak reported by kmemleak:\n\n  unreferenced object 0xffffc900003f0000 (size 12288):\n    comm \"modprobe\", pid 19117, jiffies 4299751452 (age 42490.264s)\n    hex dump (first 32 bytes):\n      00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................\n      00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................\n    backtrace:\n      [<00000000629261a8>] __vmalloc_node_range+0xe56/0x1110\n      [<0000000001906886>] __vmalloc_node+0xbd/0x150\n      [<000000005bb4dc34>] vmalloc+0x25/0x30\n      [<00000000a2dc1194>] qla2x00_create_host+0x7a0/0xe30 [qla2xxx]\n      [<0000000062b14b47>] qla2x00_probe_one+0x2eb8/0xd160 [qla2xxx]\n      [<00000000641ccc04>] local_pci_probe+0xeb/0x1a0\n\nThe root cause is traced to an error-handling path in qla2x00_probe_one()\nwhen the adapter \"base_vha\" initialize failed. The fab_scan_rp \"scan.l\" is\nused to record the port information and it is allocated in\nqla2x00_create_host(). However, it is not released in the error handling\npath \"probe_failed\".\n\nFix this by freeing the memory of \"scan.l\" when an error occurs in the\nadapter initialization process."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/scsi/qla2xxx/qla_os.c"],"versions":[{"version":"a4239945b8ad112fb914d0605c8f6c5fd3330f61","lessThan":"ae73c4dd48f2c79d515d509a0cbe9efb0a197f44","status":"affected","versionType":"git"},{"version":"a4239945b8ad112fb914d0605c8f6c5fd3330f61","lessThan":"44374911ac63f769c442f56fdfadea673c5f4425","status":"affected","versionType":"git"},{"version":"a4239945b8ad112fb914d0605c8f6c5fd3330f61","lessThan":"582e35e97318ccd9c81774bac08938291679525f","status":"affected","versionType":"git"},{"version":"a4239945b8ad112fb914d0605c8f6c5fd3330f61","lessThan":"85ade4010e13ef152ea925c74d94253db92e5428","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/scsi/qla2xxx/qla_os.c"],"versions":[{"version":"4.16","status":"affected"},{"version":"0","lessThan":"4.16","status":"unaffected","versionType":"semver"},{"version":"5.15.107","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.24","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.2.11","lessThanOrEqual":"6.2.*","status":"unaffected","versionType":"semver"},{"version":"6.3","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.16","versionEndExcluding":"5.15.107"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.16","versionEndExcluding":"6.1.24"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.16","versionEndExcluding":"6.2.11"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.16","versionEndExcluding":"6.3"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/ae73c4dd48f2c79d515d509a0cbe9efb0a197f44"},{"url":"https://git.kernel.org/stable/c/44374911ac63f769c442f56fdfadea673c5f4425"},{"url":"https://git.kernel.org/stable/c/582e35e97318ccd9c81774bac08938291679525f"},{"url":"https://git.kernel.org/stable/c/85ade4010e13ef152ea925c74d94253db92e5428"}],"title":"scsi: qla2xxx: Fix memory leak in qla2x00_probe_one()","x_generator":{"engine":"bippy-1.2.0"}}}}