CVE-2023-53056

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-53056
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-53056.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-53056
Related
Published
2025-05-02T16:15:24Z
Modified
2025-05-05T20:54:45Z
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved:

scsi: qla2xxx: Synchronize the IOCB count to be in order

A system hang was observed with the following call trace:

BUG: kernel NULL pointer dereference, address: 0000000000000000 PGD 0 P4D 0 Oops: 0000 [#1] PREEMPT SMP NOPTI CPU: 15 PID: 86747 Comm: nvme Kdump: loaded Not tainted 6.2.0+ #1 Hardware name: Dell Inc. PowerEdge R6515/04F3CJ, BIOS 2.7.3 03/31/2022 RIP: 0010:_wakeupcommon+0x55/0x190 Code: 41 f6 01 04 0f 85 b2 00 00 00 48 8b 43 08 4c 8d 40 e8 48 8d 43 08 48 89 04 24 48 89 c6\ 49 8d 40 18 48 39 c6 0f 84 e9 00 00 00 <49> 8b 40 18 89 6c 24 14 31 ed 4c 8d 60 e8 41 8b 18 f6 c3 04 75 5d RSP: 0018:ffffb05a82afbba0 EFLAGS: 00010082 RAX: 0000000000000000 RBX: ffff8f9b83a00018 RCX: 0000000000000000 RDX: 0000000000000001 RSI: ffff8f9b83a00020 RDI: ffff8f9b83a00018 RBP: 0000000000000001 R08: ffffffffffffffe8 R09: ffffb05a82afbbf8 R10: 70735f7472617473 R11: 5f30307832616c71 R12: 0000000000000001 R13: 0000000000000003 R14: 0000000000000000 R15: 0000000000000000 FS: 00007f815cf4c740(0000) GS:ffff8f9eeed80000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000000 CR3: 000000010633a000 CR4: 0000000000350ee0 Call Trace: <TASK> _wakeupcommonlock+0x83/0xd0 qlanvmelsreq+0x21b/0x2b0 [qla2xxx] _nvmefcsendlsreq+0x1b5/0x350 [nvmefc] nvmefcxmtdisconnectassoc+0xca/0x110 [nvmefc] nvmefcdeleteassociation+0x1bf/0x220 [nvmefc] ? nvmeremovenamespaces+0x9f/0x140 [nvmecore] nvmedodeletectrl+0x5b/0xa0 [nvmecore] nvmesysfsdelete+0x5f/0x70 [nvmecore] kernfsfopwriteiter+0x12b/0x1c0 vfswrite+0x2a3/0x3b0 ksyswrite+0x5f/0xe0 dosyscall64+0x5c/0x90 ? syscallexitwork+0x103/0x130 ? syscallexittousermode+0x12/0x30 ? dosyscall64+0x69/0x90 ? exittousermodeloop+0xd0/0x130 ? exittousermodeprepare+0xec/0x100 ? syscallexittousermode+0x12/0x30 ? dosyscall64+0x69/0x90 ? syscallexittousermode+0x12/0x30 ? dosyscall64+0x69/0x90 entrySYSCALL64afterhwframe+0x72/0xdc RIP: 0033:0x7f815cd3eb97

The IOCB counts are out of order and that would block any commands from going out and subsequently hang the system. Synchronize the IOCB count to be in correct order.

References

Affected packages

Debian:12 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.1.25-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.1.25-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}