In the Linux kernel, the following vulnerability has been resolved: scsi: aic94xx: fix use-after-free in device removal path The asd_pci_remove() function fails to synchronize with pending tasklets before freeing the asd_ha structure, leading to a potential use-after-free vulnerability. When a device removal is triggered (via hot-unplug or module unload), race condition can occur. The fix adds tasklet_kill() before freeing the asd_ha structure, ensuring all scheduled tasklets complete before cleanup proceeds.
| Vendor | Product | Versions |
|---|---|---|
| linux | linux_kernel | < 5.10.248, < 5.15.198, < 6.1.160, < 6.6.120, < 6.12.64, < 6.18.3 |
Downstream vendors/products affected by this vulnerability
| Vendor | Product | Source | Confidence |
|---|---|---|---|
| amazon | amazon linux | cert_advisory | 90% |
| canonical | ubuntu linux | cert_advisory | 90% |
| debian | debian linux | cert_advisory | 90% |
| ibm | ibm qradar siem | cert_advisory | 90% |
| open source | open source linux kernel | cert_advisory | 90% |