CVE-2023-54310

medium

Description

In the Linux kernel, the following vulnerability has been resolved: scsi: message: mptlan: Fix use after free bug in mptlan_remove() due to race condition mptlan_probe() calls mpt_register_lan_device() which initializes the &priv->post_buckets_task workqueue. A call to mpt_lan_wake_post_buckets_task() will subsequently start the work. During driver unload in mptlan_remove() the following race may occur: CPU0 CPU1 |mpt_lan_post_receive_buckets_work() mptlan_remove() | free_netdev() | kfree(dev); | | | dev->mtu | //use Fix this by finishing the work prior to cleaning up in mptlan_remove(). [mkp: we really should remove mptlan instead of attempting to fix it]

References

https://git.kernel.org/stable/c/f486893288f3e9b171b836f43853a6426515d800

https://git.kernel.org/stable/c/e84282efc87f2414839f6e15c31b4daa34ebaac1

https://git.kernel.org/stable/c/9c6da3b7f12528cd52c458b33496a098b838fcfc

https://git.kernel.org/stable/c/92f869693d84e813895ff4d25363744575515423

https://git.kernel.org/stable/c/697f92f8317e538d8409a0c95d6370eb40b34c05

https://git.kernel.org/stable/c/60c8645ad6f5b722615383d595d63b62b07a13c3

https://git.kernel.org/stable/c/48daa4a3015d859ee424948844ce3c12f2fe44e6

https://git.kernel.org/stable/c/410e610a96c52a7b41e2ab6c9ca60868d9acecce

Details

Source: Mitre, NVD

Published: 2025-12-30

Updated: 2025-12-31

Risk Information

CVSS v2

Base Score: 5.9

Vector: CVSS2#AV:L/AC:M/Au:N/C:P/I:P/A:C

Severity: Medium

CVSS v3

Base Score: 6.3

Vector: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H

Severity: Medium

EPSS

EPSS: 0.00024