CVE-2023-54324
Use-After-Free Race Condition in Linux Kernel Multipath Device Manager
Publication date: 2025-12-30
Last updated on: 2025-12-30
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a race condition in the Linux kernel's device mapper multipath target. Specifically, the function retrieve_deps accesses a list of open devices without holding a lock, while other functions (multipath_message calling dm_get_device and dm_put_device) may concurrently add or remove devices from that list. This can lead to memory corruption or use-after-free (UAF) errors because the list is modified while being read. The issue was fixed by introducing a new read-write semaphore called devices_lock to properly synchronize access to the device list.
How can this vulnerability impact me? :
This vulnerability can cause memory corruption or use-after-free conditions in the Linux kernel's multipath device mapper. Such memory errors can lead to system instability, crashes, or potentially allow an attacker to execute arbitrary code or cause denial of service by exploiting the race condition.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the Linux kernel to a version that includes the fix for the race condition in retrieve_deps. The fix involves introducing a new rw semaphore "devices_lock" to properly synchronize access to the list of open devices, preventing memory corruption or use-after-free errors.