vulnerability
Ubuntu: (CVE-2023-54184): linux vulnerability
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:L/AC:L/Au:S/C:N/I:N/A:C) | Jan 2, 2026 | Jan 6, 2026 | Jan 6, 2026 |
Description
In the Linux kernel, the following vulnerability has been resolved: scsi: target: iscsit: Free cmds before session free Commands from recovery entries are freed after session has been closed. That leads to use-after-free at command free or NPE with such call trace: Time2Retain timer expired for SID: 1, cleaning up iSCSI session. BUG: kernel NULL pointer dereference, address: 0000000000000140 RIP: 0010:sbitmap_queue_clear+0x3a/0xa0 Call Trace: target_release_cmd_kref+0xd1/0x1f0 [target_core_mod] transport_generic_free_cmd+0xd1/0x180 [target_core_mod] iscsit_free_cmd+0x53/0xd0 [iscsi_target_mod] iscsit_free_connection_recovery_entries+0x29d/0x320 [iscsi_target_mod] iscsit_close_session+0x13a/0x140 [iscsi_target_mod] iscsit_check_post_dataout+0x440/0x440 [iscsi_target_mod] call_timer_fn+0x24/0x140 Move cleanup of recovery enrties to before session freeing.
Solutions
References
- CVE-2023-54184
- https://attackerkb.com/topics/CVE-2023-54184
- URL-https://git.kernel.org/linus/d8990b5a4d065f38f35d69bcd627ec5a7f8330ca
- URL-https://git.kernel.org/stable/c/1911cca5916b6e106de7afa3ec0a38447158216c
- URL-https://git.kernel.org/stable/c/4621e24c9257c6379343bf0c11b473817cf7edcd
- URL-https://git.kernel.org/stable/c/4ce221d295f53e6c6b835ab33181e735482c9aac
- URL-https://git.kernel.org/stable/c/89f5055f9b0b57c7e7f02e32df95ef401f809b71
- URL-https://git.kernel.org/stable/c/a7a4def6c7046e090bb10c6d550fdeb487db98ba
- URL-https://git.kernel.org/stable/c/d8990b5a4d065f38f35d69bcd627ec5a7f8330ca
- URL-https://www.cve.org/CVERecord?id=CVE-2023-54184
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.