CVE-2023-54310
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
30/12/2025
Last modified:
30/12/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
scsi: message: mptlan: Fix use after free bug in mptlan_remove() due to race condition<br />
<br />
mptlan_probe() calls mpt_register_lan_device() which initializes the<br />
&priv->post_buckets_task workqueue. A call to<br />
mpt_lan_wake_post_buckets_task() will subsequently start the work.<br />
<br />
During driver unload in mptlan_remove() the following race may occur:<br />
<br />
CPU0 CPU1<br />
<br />
|mpt_lan_post_receive_buckets_work()<br />
mptlan_remove() |<br />
free_netdev() |<br />
kfree(dev); |<br />
|<br />
| dev->mtu<br />
| //use<br />
<br />
Fix this by finishing the work prior to cleaning up in mptlan_remove().<br />
<br />
[mkp: we really should remove mptlan instead of attempting to fix it]
Impact
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/410e610a96c52a7b41e2ab6c9ca60868d9acecce
- https://git.kernel.org/stable/c/48daa4a3015d859ee424948844ce3c12f2fe44e6
- https://git.kernel.org/stable/c/60c8645ad6f5b722615383d595d63b62b07a13c3
- https://git.kernel.org/stable/c/697f92f8317e538d8409a0c95d6370eb40b34c05
- https://git.kernel.org/stable/c/92f869693d84e813895ff4d25363744575515423
- https://git.kernel.org/stable/c/9c6da3b7f12528cd52c458b33496a098b838fcfc
- https://git.kernel.org/stable/c/e84282efc87f2414839f6e15c31b4daa34ebaac1
- https://git.kernel.org/stable/c/f486893288f3e9b171b836f43853a6426515d800



