{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-15T11:37:24.909","vulnerabilities":[{"cve":{"id":"CVE-2023-53078","sourceIdentifier":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","published":"2025-05-02T16:15:26.820","lastModified":"2025-11-12T20:49:25.560","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: scsi_dh_alua: Fix memleak for 'qdata' in alua_activate()\n\nIf alua_rtpg_queue() failed from alua_activate(), then 'qdata' is not\nfreed, which will cause following memleak:\n\nunreferenced object 0xffff88810b2c6980 (size 32):\n  comm \"kworker\/u16:2\", pid 635322, jiffies 4355801099 (age 1216426.076s)\n  hex dump (first 32 bytes):\n    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................\n    40 39 24 c1 ff ff ff ff 00 f8 ea 0a 81 88 ff ff  @9$.............\n  backtrace:\n    [<0000000098f3a26d>] alua_activate+0xb0\/0x320\n    [<000000003b529641>] scsi_dh_activate+0xb2\/0x140\n    [<000000007b296db3>] activate_path_work+0xc6\/0xe0 [dm_multipath]\n    [<000000007adc9ace>] process_one_work+0x3c5\/0x730\n    [<00000000c457a985>] worker_thread+0x93\/0x650\n    [<00000000cb80e628>] kthread+0x1ba\/0x210\n    [<00000000a1e61077>] ret_from_fork+0x22\/0x30\n\nFix the problem by freeing 'qdata' in error path."},{"lang":"es","value":"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: scsi: scsi_dh_alua: Se corrige la fuga de memoria para 'qdata' en alua_activate(). Si alua_rtpg_queue() falla desde alua_activate(), entonces 'qdata' no se libera, lo que causará la siguiente fuga de memoria: objeto sin referencia 0xffff88810b2c6980 (tamaño 32): comm \"kworker\/u16:2\", pid 635322, jiffies 4355801099 (edad 1216426.076s) volcado hexadecimal (primeros 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 40 39 24 c1 ff ff ff ff 00 f8 ea 0a 81 88 ff ff @9$............. backtrace: [&lt;0000000098f3a26d&gt;] alua_activate+0xb0\/0x320 [&lt;000000003b529641&gt;] scsi_dh_activate+0xb2\/0x140 [&lt;000000007b296db3&gt;] activate_path_work+0xc6\/0xe0 [dm_multipath] [&lt;000000007adc9ace&gt;] process_one_work+0x3c5\/0x730 [&lt;00000000c457a985&gt;] worker_thread+0x93\/0x650 [&lt;00000000cb80e628&gt;] kthread+0x1ba\/0x210 [&lt;00000000a1e61077&gt;] ret_from_fork+0x22\/0x30 Solucione el problema liberando 'qdata' en la ruta de error."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1\/AV:L\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:N\/A:H","baseScore":5.5,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":3.6}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-401"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.9.21","versionEndExcluding":"4.10","matchCriteriaId":"229871C9-E27A-4502-AFDC-7C777C21AC22"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.10.9","versionEndExcluding":"4.11","matchCriteriaId":"A1D44092-A2CB-49EB-9E33-257AC7F9F3C4"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.11.1","versionEndExcluding":"4.14.312","matchCriteriaId":"EBDB8DD9-108F-413D-A24A-A13F7A6855CF"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.15","versionEndExcluding":"4.19.280","matchCriteriaId":"B8449DA5-0637-406C-99C3-84AF4CB5F3EB"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.20","versionEndExcluding":"5.4.240","matchCriteriaId":"2C5F51A3-AEBF-4E51-AA58-D8C8B4554A86"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.5","versionEndExcluding":"5.10.177","matchCriteriaId":"9FED8369-E7A1-48C6-9700-6ADEDEC371F7"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.11","versionEndExcluding":"5.15.105","matchCriteriaId":"0888AE70-CB0A-45C0-B9BD-A5371244C8DB"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"5.16","versionEndExcluding":"6.1.22","matchCriteriaId":"642B6F99-95C6-47F5-A9B1-5C45FE08CAD0"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.2","versionEndExcluding":"6.2.9","matchCriteriaId":"914F22DD-1E6F-4B0A-A14D-3A9F068F6761"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:4.11:-:*:*:*:*:*:*","matchCriteriaId":"623D643F-123E-4D3E-8CBF-16BF845D734B"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:4.11:rc5:*:*:*:*:*:*","matchCriteriaId":"ACE2C8C3-F2AA-4A39-9D81-B0F8BB82B834"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:4.11:rc6:*:*:*:*:*:*","matchCriteriaId":"D67BFFD0-1A52-4F5D-98DB-D94B58FD8D30"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:4.11:rc7:*:*:*:*:*:*","matchCriteriaId":"7D996F38-22AC-4059-84FC-F7D69CE0CB9B"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:4.11:rc8:*:*:*:*:*:*","matchCriteriaId":"97EFF4F7-E5F9-4FAA-AD58-94A24501AD59"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:6.3:rc1:*:*:*:*:*:*","matchCriteriaId":"B8E3B0E8-FA27-4305-87BB-AF6C25B160CB"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:6.3:rc2:*:*:*:*:*:*","matchCriteriaId":"A47F0FC3-CE52-4BA1-BA51-22F783938431"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:6.3:rc3:*:*:*:*:*:*","matchCriteriaId":"3583026A-27EC-4A4C-850A-83F2AF970673"}]}]}],"references":[{"url":"https:\/\/git.kernel.org\/stable\/c\/0d89254a4320eb7de0970c478172f764125c6355","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https:\/\/git.kernel.org\/stable\/c\/123483df146492ca22b503ae6dacc2ce7c3a3974","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https:\/\/git.kernel.org\/stable\/c\/1c55982beb80c7d3c30278fc6cfda8496a31dbe6","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https:\/\/git.kernel.org\/stable\/c\/5c4d71424df34fc23dc5336d09394ce68c849542","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https:\/\/git.kernel.org\/stable\/c\/9311e7a554dffd3823499e309a8b86a5cd1540e5","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https:\/\/git.kernel.org\/stable\/c\/a13faca032acbf2699293587085293bdfaafc8ae","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https:\/\/git.kernel.org\/stable\/c\/c09cdf6eb815ee35e55d6c50ac7f63db58bd20b8","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]},{"url":"https:\/\/git.kernel.org\/stable\/c\/c110051d335ef7f62ad33474b0c23997fee5bfb5","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":["Patch"]}]}}]}