CVE-2023-54234
Unknown Unknown - Not Provided
Use-After-Free in Linux Kernel SCSI mpi3mr Due to Uninitialized Array

Publication date: 2025-12-30

Last updated on: 2025-12-30

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: scsi: mpi3mr: Fix missing mrioc->evtack_cmds initialization Commit c1af985d27da ("scsi: mpi3mr: Add Event acknowledgment logic") introduced an array mrioc->evtack_cmds but initialization of the array elements was missed. They are just zero cleared. The function mpi3mr_complete_evt_ack() refers host_tag field of the elements. Due to the zero value of the host_tag field, the function calls clear_bit() for mrico->evtack_cmds_bitmap with wrong bit index. This results in memory access to invalid address and "BUG: KASAN: use-after-free". This BUG was observed at eHBA-9600 firmware update to version 8.3.1.0. To fix it, add the missing initialization of mrioc->evtack_cmds.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-30
Last Modified
2025-12-30
Generated
2026-05-07
AI Q&A
2025-12-30
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
linux kernel *
linux linux_kernel *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in the Linux kernel's scsi mpi3mr driver is due to missing initialization of an array called mrioc->evtack_cmds. Because the elements of this array were not properly initialized, a function called mpi3mr_complete_evt_ack() uses an invalid index when calling clear_bit(), leading to memory access at an invalid address and causing a use-after-free bug detected by KASAN.


How can this vulnerability impact me? :

The vulnerability can cause the Linux kernel to access invalid memory, resulting in a use-after-free bug. This can lead to system instability, crashes, or potential security risks related to memory corruption.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, update the Linux kernel to a version that includes the fix for the missing initialization of mrioc->evtack_cmds, as described in commit c1af985d27da. This fix prevents the use-after-free bug caused by invalid memory access. Applying the latest kernel patches or firmware updates that address this issue is recommended.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart