CVE-2023-54100Expired Pointer Dereference in Linux

Severity
5.5MEDIUM
No vector
EPSS
0.0%
top 89.30%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 24

Description

In the Linux kernel, the following vulnerability has been resolved: scsi: qedi: Fix use after free bug in qedi_remove() In qedi_probe() we call __qedi_probe() which initializes &qedi->recovery_work with qedi_recovery_handler() and &qedi->board_disable_work with qedi_board_disable_work(). When qedi_schedule_recovery_handler() is called, schedule_delayed_work() will finally start the work. In qedi_remove(), which is called to remove the driver, the following sequence may be observed: Fix this

Affected Packages4 packages

Linuxlinux/linux_kernel5.7.05.10.180+4
Debianlinux/linux_kernel< 5.10.191-1+3
CVEListV5linux/linux4b1068f5d74b6cc92319bd7eba40809b1222e73ffa19c533ab19161298f0780bcc6523af88f6fd20+6
debiandebian/linux< linux 6.1.37-1 (bookworm)

🔴Vulnerability Details

3
GHSA
GHSA-vqg2-rjjw-jc84: In the Linux kernel, the following vulnerability has been resolved: scsi: qedi: Fix use after free bug in qedi_remove() In qedi_probe() we call __qe2025-12-24
OSV
CVE-2023-54100: In the Linux kernel, the following vulnerability has been resolved: scsi: qedi: Fix use after free bug in qedi_remove() In qedi_probe() we call __qedi2025-12-24
OSV
scsi: qedi: Fix use after free bug in qedi_remove()2025-12-24

📋Vendor Advisories

2
Red Hat
kernel: scsi: qedi: Fix use after free bug in qedi_remove()2025-12-24
Debian
CVE-2023-54100: linux - In the Linux kernel, the following vulnerability has been resolved: scsi: qedi:...2023

🕵️Threat Intelligence

1
Wiz
CVE-2023-54100 Impact, Exploitability, and Mitigation Steps | Wiz