CVE-2023-54310
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved:
scsi: message: mptlan: Fix use after free bug in mptlan_remove() due to race condition
mptlan_probe() calls mpt_register_lan_device() which initializes the
&priv->post_buckets_task workqueue. A call to
mpt_lan_wake_post_buckets_task() will subsequently start the work.
During driver unload in mptlan_remove() the following race may occur:
CPU0 CPU1
|mpt_lan_post_receive_buckets_work()
mptlan_remove() |
free_netdev() |
kfree(dev); |
|
| dev->mtu
| //use
Fix this by finishing the work prior to cleaning up in mptlan_remove().
[mkp: we really should remove mptlan instead of attempting to fix it]
scsi: message: mptlan: Fix use after free bug in mptlan_remove() due to race condition
mptlan_probe() calls mpt_register_lan_device() which initializes the
&priv->post_buckets_task workqueue. A call to
mpt_lan_wake_post_buckets_task() will subsequently start the work.
During driver unload in mptlan_remove() the following race may occur:
CPU0 CPU1
|mpt_lan_post_receive_buckets_work()
mptlan_remove() |
free_netdev() |
kfree(dev); |
|
| dev->mtu
| //use
Fix this by finishing the work prior to cleaning up in mptlan_remove().
[mkp: we really should remove mptlan instead of attempting to fix it]
Vulnerability Details
Published Date
Last Modified
Source
NVD
External References
- https://git.kernel.org/stable/c/410e610a96c52a7b41e2ab6c9ca60868d9acecce
- https://git.kernel.org/stable/c/48daa4a3015d859ee424948844ce3c12f2fe44e6
- https://git.kernel.org/stable/c/60c8645ad6f5b722615383d595d63b62b07a13c3
- https://git.kernel.org/stable/c/697f92f8317e538d8409a0c95d6370eb40b34c05
- https://git.kernel.org/stable/c/92f869693d84e813895ff4d25363744575515423
- https://git.kernel.org/stable/c/9c6da3b7f12528cd52c458b33496a098b838fcfc
- https://git.kernel.org/stable/c/e84282efc87f2414839f6e15c31b4daa34ebaac1
- https://git.kernel.org/stable/c/f486893288f3e9b171b836f43853a6426515d800
Discussion (0)
Add Comment
No comments yet. Be the first!