CVE-2023-53120

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-53120
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-53120.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-53120
Downstream
Published
2025-05-02T15:55:57Z
Modified
2025-10-15T05:50:03.982780Z
Summary
scsi: mpi3mr: Fix config page DMA memory leak
Details

In the Linux kernel, the following vulnerability has been resolved:

scsi: mpi3mr: Fix config page DMA memory leak

A fix for:

DMA-API: pci 0000:83:00.0: device driver has pending DMA allocations while released from device [count=1]

References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
32d457d5a2af9bf5ddbe28297eabf1fc93451665
Fixed
dca06ccf13de14e144d34f158f73ae0032f80e63
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
32d457d5a2af9bf5ddbe28297eabf1fc93451665
Fixed
5fc4d698ed4b6507be2eb36d040a678adcb89da4
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
32d457d5a2af9bf5ddbe28297eabf1fc93451665
Fixed
7d2b02172b6a2ae6aecd7ef6480b9c4bf3dc59f4

Affected versions

v6.*

v6.0
v6.0-rc2
v6.0-rc3
v6.0-rc4
v6.0-rc5
v6.0-rc6
v6.0-rc7
v6.1
v6.1-rc1
v6.1-rc2
v6.1-rc3
v6.1-rc4
v6.1-rc5
v6.1-rc6
v6.1-rc7
v6.1-rc8
v6.1.1
v6.1.10
v6.1.11
v6.1.12
v6.1.13
v6.1.14
v6.1.15
v6.1.16
v6.1.17
v6.1.18
v6.1.19
v6.1.2
v6.1.20
v6.1.3
v6.1.4
v6.1.5
v6.1.6
v6.1.7
v6.1.8
v6.1.9
v6.2
v6.2-rc1
v6.2-rc2
v6.2-rc3
v6.2-rc4
v6.2-rc5
v6.2-rc6
v6.2-rc7
v6.2-rc8
v6.2.1
v6.2.2
v6.2.3
v6.2.4
v6.2.5
v6.2.6
v6.2.7
v6.3-rc1

Database specific

{
    "vanir_signatures": [
        {
            "deprecated": false,
            "signature_type": "Function",
            "target": {
                "file": "drivers/scsi/mpi3mr/mpi3mr_fw.c",
                "function": "mpi3mr_free_mem"
            },
            "signature_version": "v1",
            "digest": {
                "length": 3846.0,
                "function_hash": "212222177762524516436452633105170011609"
            },
            "id": "CVE-2023-53120-6a82295e",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5fc4d698ed4b6507be2eb36d040a678adcb89da4"
        },
        {
            "deprecated": false,
            "signature_type": "Line",
            "target": {
                "file": "drivers/scsi/mpi3mr/mpi3mr_fw.c"
            },
            "signature_version": "v1",
            "digest": {
                "line_hashes": [
                    "172171017295540181755135538074181116447",
                    "255591818594122355984697542562227590269",
                    "330292846471188928775723306697963966238"
                ],
                "threshold": 0.9
            },
            "id": "CVE-2023-53120-6f5fc2dd",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@5fc4d698ed4b6507be2eb36d040a678adcb89da4"
        },
        {
            "deprecated": false,
            "signature_type": "Function",
            "target": {
                "file": "drivers/scsi/mpi3mr/mpi3mr_fw.c",
                "function": "mpi3mr_free_mem"
            },
            "signature_version": "v1",
            "digest": {
                "length": 3846.0,
                "function_hash": "212222177762524516436452633105170011609"
            },
            "id": "CVE-2023-53120-92baf7cc",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@dca06ccf13de14e144d34f158f73ae0032f80e63"
        },
        {
            "deprecated": false,
            "signature_type": "Line",
            "target": {
                "file": "drivers/scsi/mpi3mr/mpi3mr_fw.c"
            },
            "signature_version": "v1",
            "digest": {
                "line_hashes": [
                    "172171017295540181755135538074181116447",
                    "255591818594122355984697542562227590269",
                    "330292846471188928775723306697963966238"
                ],
                "threshold": 0.9
            },
            "id": "CVE-2023-53120-99911eda",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@dca06ccf13de14e144d34f158f73ae0032f80e63"
        },
        {
            "deprecated": false,
            "signature_type": "Line",
            "target": {
                "file": "drivers/scsi/mpi3mr/mpi3mr_fw.c"
            },
            "signature_version": "v1",
            "digest": {
                "line_hashes": [
                    "172171017295540181755135538074181116447",
                    "255591818594122355984697542562227590269",
                    "330292846471188928775723306697963966238"
                ],
                "threshold": 0.9
            },
            "id": "CVE-2023-53120-c9b8ccae",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7d2b02172b6a2ae6aecd7ef6480b9c4bf3dc59f4"
        },
        {
            "deprecated": false,
            "signature_type": "Function",
            "target": {
                "file": "drivers/scsi/mpi3mr/mpi3mr_fw.c",
                "function": "mpi3mr_free_mem"
            },
            "signature_version": "v1",
            "digest": {
                "length": 3846.0,
                "function_hash": "212222177762524516436452633105170011609"
            },
            "id": "CVE-2023-53120-ea5fe1bd",
            "source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@7d2b02172b6a2ae6aecd7ef6480b9c4bf3dc59f4"
        }
    ]
}

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.1.0
Fixed
6.1.21
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.2.8