CVE-2023-54234
Use-After-Free in Linux Kernel SCSI mpi3mr Due to Uninitialized Array
Publication date: 2025-12-30
Last updated on: 2025-12-30
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | kernel | * |
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's scsi mpi3mr driver is due to missing initialization of an array called mrioc->evtack_cmds. Because the elements of this array were not properly initialized, a function called mpi3mr_complete_evt_ack() uses an invalid index when calling clear_bit(), leading to memory access at an invalid address and causing a use-after-free bug detected by KASAN.
How can this vulnerability impact me? :
The vulnerability can cause the Linux kernel to access invalid memory, resulting in a use-after-free bug. This can lead to system instability, crashes, or potential security risks related to memory corruption.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the Linux kernel to a version that includes the fix for the missing initialization of mrioc->evtack_cmds, as described in commit c1af985d27da. This fix prevents the use-after-free bug caused by invalid memory access. Applying the latest kernel patches or firmware updates that address this issue is recommended.