{"id":"CVE-2023-52515","summary":"RDMA/srp: Do not call scsi_done() from srp_abort()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/srp: Do not call scsi_done() from srp_abort()\n\nAfter scmd_eh_abort_handler() has called the SCSI LLD eh_abort_handler\ncallback, it performs one of the following actions:\n* Call scsi_queue_insert().\n* Call scsi_finish_command().\n* Call scsi_eh_scmd_add().\nHence, SCSI abort handlers must not call scsi_done(). Otherwise all\nthe above actions would trigger a use-after-free. Hence remove the\nscsi_done() call from srp_abort(). Keep the srp_free_req() call\nbefore returning SUCCESS because we may not see the command again if\nSUCCESS is returned.","modified":"2026-04-11T12:46:31.911692Z","published":"2024-03-02T21:52:25.863Z","related":["SUSE-SU-2024:1320-1","SUSE-SU-2024:1321-1","SUSE-SU-2024:1466-1","SUSE-SU-2024:1480-1","SUSE-SU-2024:1490-1","SUSE-SU-2024:1643-1","SUSE-SU-2024:1646-1","SUSE-SU-2024:1870-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52515.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/05a10b316adaac1f322007ca9a0383b410d759cc"},{"type":"WEB","url":"https://git.kernel.org/stable/c/26788a5b48d9d5cd3283d777d238631c8cd7495a"},{"type":"WEB","url":"https://git.kernel.org/stable/c/2b298f9181582270d5e95774e5a6c7a7fb5b1206"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b9bdffb3f9aaeff8379c83f5449c6b42cb71c2b5"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e193b7955dfad68035b983a0011f4ef3590c85eb"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52515.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52515"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"d8536670916a685df116b5c2cb256573fd25e4e3"},{"fixed":"26788a5b48d9d5cd3283d777d238631c8cd7495a"},{"fixed":"b9bdffb3f9aaeff8379c83f5449c6b42cb71c2b5"},{"fixed":"2b298f9181582270d5e95774e5a6c7a7fb5b1206"},{"fixed":"05a10b316adaac1f322007ca9a0383b410d759cc"},{"fixed":"e193b7955dfad68035b983a0011f4ef3590c85eb"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"0"},{"last_affected":"738589592a04180e39b6fb5fe8205d85b7dc69f6"},{"last_affected":"0575df129e2eb4a801beae0e6e041787480f42b9"},{"last_affected":"22fb582405002812d8fb89d0ed1264e97d3d25ad"},{"last_affected":"39d6594c457c4728794cb4c3c7be53f93f1ef3ae"},{"last_affected":"b3f3b814add77a464911df0080d812b18f61ff38"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52515.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"3.7.0"},{"fixed":"5.10.199"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.136"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.57"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.5.7"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-52515.json"}}],"schema_version":"1.7.5"}