CVE-2023-54324

Source
https://cve.org/CVERecord?id=CVE-2023-54324
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-54324.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-54324
Downstream
Related
Published
2025-12-30T12:37:08.337Z
Modified
2026-03-23T05:29:45.314151Z
Summary
dm: fix a race condition in retrieve_deps
Details

In the Linux kernel, the following vulnerability has been resolved:

dm: fix a race condition in retrieve_deps

There's a race condition in the multipath target when retrievedeps races with multipathmessage calling dmgetdevice and dmputdevice. retrieve_deps walks the list of open devices without holding any lock but multipath may add or remove devices to the list while it is running. The end result may be memory corruption or use-after-free memory access.

See this description of a UAF with multipath_message(): https://listman.redhat.com/archives/dm-devel/2022-October/052373.html

Fix this bug by introducing a new rw semaphore "deviceslock". We grab deviceslock for read in retrievedeps and we grab it for write in dmgetdevice and dmput_device.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/54xxx/CVE-2023-54324.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Fixed
dbf1a719850577bb51fc7512a3972994b797a17b
Fixed
38f6e5ae5d9ff4a4050ea6f7b543d5d5a4e087cf
Fixed
f6007dce0cd35d634d9be91ef3515a6385dcee16

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-54324.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
2.6.12
Fixed
6.1.56
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.5.5

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-54324.json"