{"id":"CVE-2023-53078","summary":"scsi: scsi_dh_alua: Fix memleak for 'qdata' in alua_activate()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: scsi_dh_alua: Fix memleak for 'qdata' in alua_activate()\n\nIf alua_rtpg_queue() failed from alua_activate(), then 'qdata' is not\nfreed, which will cause following memleak:\n\nunreferenced object 0xffff88810b2c6980 (size 32):\n  comm \"kworker/u16:2\", pid 635322, jiffies 4355801099 (age 1216426.076s)\n  hex dump (first 32 bytes):\n    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................\n    40 39 24 c1 ff ff ff ff 00 f8 ea 0a 81 88 ff ff  @9$.............\n  backtrace:\n    [\u003c0000000098f3a26d\u003e] alua_activate+0xb0/0x320\n    [\u003c000000003b529641\u003e] scsi_dh_activate+0xb2/0x140\n    [\u003c000000007b296db3\u003e] activate_path_work+0xc6/0xe0 [dm_multipath]\n    [\u003c000000007adc9ace\u003e] process_one_work+0x3c5/0x730\n    [\u003c00000000c457a985\u003e] worker_thread+0x93/0x650\n    [\u003c00000000cb80e628\u003e] kthread+0x1ba/0x210\n    [\u003c00000000a1e61077\u003e] ret_from_fork+0x22/0x30\n\nFix the problem by freeing 'qdata' in error path.","modified":"2026-04-03T13:14:37.544165054Z","published":"2025-05-02T15:55:28.246Z","related":["SUSE-SU-2025:01918-1","SUSE-SU-2025:01966-1","SUSE-SU-2025:01983-1","SUSE-SU-2025:02173-1","SUSE-SU-2025:02262-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53078.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/0d89254a4320eb7de0970c478172f764125c6355"},{"type":"WEB","url":"https://git.kernel.org/stable/c/123483df146492ca22b503ae6dacc2ce7c3a3974"},{"type":"WEB","url":"https://git.kernel.org/stable/c/1c55982beb80c7d3c30278fc6cfda8496a31dbe6"},{"type":"WEB","url":"https://git.kernel.org/stable/c/5c4d71424df34fc23dc5336d09394ce68c849542"},{"type":"WEB","url":"https://git.kernel.org/stable/c/9311e7a554dffd3823499e309a8b86a5cd1540e5"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a13faca032acbf2699293587085293bdfaafc8ae"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c09cdf6eb815ee35e55d6c50ac7f63db58bd20b8"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c110051d335ef7f62ad33474b0c23997fee5bfb5"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53078.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53078"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"625fe857e4fac6518716f3c0ff5e5deb8ec6d238"},{"fixed":"123483df146492ca22b503ae6dacc2ce7c3a3974"},{"fixed":"c110051d335ef7f62ad33474b0c23997fee5bfb5"},{"fixed":"5c4d71424df34fc23dc5336d09394ce68c849542"},{"fixed":"c09cdf6eb815ee35e55d6c50ac7f63db58bd20b8"},{"fixed":"9311e7a554dffd3823499e309a8b86a5cd1540e5"},{"fixed":"1c55982beb80c7d3c30278fc6cfda8496a31dbe6"},{"fixed":"0d89254a4320eb7de0970c478172f764125c6355"},{"fixed":"a13faca032acbf2699293587085293bdfaafc8ae"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"0"},{"last_affected":"68b275b7cbf065a8ea9b964cbb7d78d2b63c635f"},{"last_affected":"2b1725d1df362499f6bbd5a7e245a4090b29c2bb"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-53078.json"}}],"schema_version":"1.7.5"}