CVE-2023-54310
Unknown Unknown - Not Provided
Use-After-Free Race Condition in Linux Kernel mptlan Driver

Publication date: 2025-12-30

Last updated on: 2025-12-30

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: scsi: message: mptlan: Fix use after free bug in mptlan_remove() due to race condition mptlan_probe() calls mpt_register_lan_device() which initializes the &priv->post_buckets_task workqueue. A call to mpt_lan_wake_post_buckets_task() will subsequently start the work. During driver unload in mptlan_remove() the following race may occur: CPU0 CPU1 |mpt_lan_post_receive_buckets_work() mptlan_remove() | free_netdev() | kfree(dev); | | | dev->mtu | //use Fix this by finishing the work prior to cleaning up in mptlan_remove(). [mkp: we really should remove mptlan instead of attempting to fix it]
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-30
Last Modified
2025-12-30
Generated
2026-05-07
AI Q&A
2025-12-30
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
linux linux_kernel *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a use-after-free bug in the Linux kernel's mptlan driver. It occurs due to a race condition during the driver unload process in the mptlan_remove() function. Specifically, while one CPU is freeing network device memory, another CPU might still be accessing that memory, leading to unsafe use of freed resources. The fix involves ensuring that all related work is completed before the cleanup happens to prevent this race condition.


How can this vulnerability impact me? :

This vulnerability can cause system instability or crashes due to the use-after-free condition in the kernel driver. It may lead to unpredictable behavior or denial of service if the kernel accesses freed memory. However, there is no information about exploitation leading to privilege escalation or data compromise.


What immediate steps should I take to mitigate this vulnerability?

The vulnerability is due to a use-after-free bug in the mptlan driver caused by a race condition during driver unload. Immediate mitigation steps include avoiding unloading the mptlan driver until a fixed kernel version is applied. Applying the kernel update that includes the fix for this issue is recommended. Additionally, consider removing or disabling the mptlan driver if it is not needed, as suggested in the description.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart