Home

Description

In the Linux kernel, the following vulnerability has been resolved: dm: fix a race condition in retrieve_deps There's a race condition in the multipath target when retrieve_deps races with multipath_message calling dm_get_device and dm_put_device. retrieve_deps walks the list of open devices without holding any lock but multipath may add or remove devices to the list while it is running. The end result may be memory corruption or use-after-free memory access. See this description of a UAF with multipath_message(): https://listman.redhat.com/archives/dm-devel/2022-October/052373.html Fix this bug by introducing a new rw semaphore "devices_lock". We grab devices_lock for read in retrieve_deps and we grab it for write in dm_get_device and dm_put_device.

PUBLISHED Reserved 2025-12-30 | Published 2025-12-30 | Updated 2025-12-30 | Assigner Linux

Product status

Default status
unaffected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before dbf1a719850577bb51fc7512a3972994b797a17b
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 38f6e5ae5d9ff4a4050ea6f7b543d5d5a4e087cf
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before f6007dce0cd35d634d9be91ef3515a6385dcee16
affected

Default status
affected

6.1.56 (semver)
unaffected

6.5.5 (semver)
unaffected

6.6 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/dbf1a719850577bb51fc7512a3972994b797a17b

git.kernel.org/...c/38f6e5ae5d9ff4a4050ea6f7b543d5d5a4e087cf

git.kernel.org/...c/f6007dce0cd35d634d9be91ef3515a6385dcee16

cve.org (CVE-2023-54324)

nvd.nist.gov (CVE-2023-54324)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.