CVE-2023-54006 (GCVE-0-2023-54006)
Vulnerability from cvelistv5 – Published: 2025-12-24 10:55 – Updated: 2025-12-24 10:55
VLAI?
Title
af_unix: Fix data-race around unix_tot_inflight.
Summary
In the Linux kernel, the following vulnerability has been resolved:
af_unix: Fix data-race around unix_tot_inflight.
unix_tot_inflight is changed under spin_lock(unix_gc_lock), but
unix_release_sock() reads it locklessly.
Let's use READ_ONCE() for unix_tot_inflight.
Note that the writer side was marked by commit 9d6d7f1cb67c ("af_unix:
annote lockless accesses to unix_tot_inflight & gc_in_progress")
BUG: KCSAN: data-race in unix_inflight / unix_release_sock
write (marked) to 0xffffffff871852b8 of 4 bytes by task 123 on cpu 1:
unix_inflight+0x130/0x180 net/unix/scm.c:64
unix_attach_fds+0x137/0x1b0 net/unix/scm.c:123
unix_scm_to_skb net/unix/af_unix.c:1832 [inline]
unix_dgram_sendmsg+0x46a/0x14f0 net/unix/af_unix.c:1955
sock_sendmsg_nosec net/socket.c:724 [inline]
sock_sendmsg+0x148/0x160 net/socket.c:747
____sys_sendmsg+0x4e4/0x610 net/socket.c:2493
___sys_sendmsg+0xc6/0x140 net/socket.c:2547
__sys_sendmsg+0x94/0x140 net/socket.c:2576
__do_sys_sendmsg net/socket.c:2585 [inline]
__se_sys_sendmsg net/socket.c:2583 [inline]
__x64_sys_sendmsg+0x45/0x50 net/socket.c:2583
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x3b/0x90 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x72/0xdc
read to 0xffffffff871852b8 of 4 bytes by task 4891 on cpu 0:
unix_release_sock+0x608/0x910 net/unix/af_unix.c:671
unix_release+0x59/0x80 net/unix/af_unix.c:1058
__sock_release+0x7d/0x170 net/socket.c:653
sock_close+0x19/0x30 net/socket.c:1385
__fput+0x179/0x5e0 fs/file_table.c:321
____fput+0x15/0x20 fs/file_table.c:349
task_work_run+0x116/0x1a0 kernel/task_work.c:179
resume_user_mode_work include/linux/resume_user_mode.h:49 [inline]
exit_to_user_mode_loop kernel/entry/common.c:171 [inline]
exit_to_user_mode_prepare+0x174/0x180 kernel/entry/common.c:204
__syscall_exit_to_user_mode_work kernel/entry/common.c:286 [inline]
syscall_exit_to_user_mode+0x1a/0x30 kernel/entry/common.c:297
do_syscall_64+0x4b/0x90 arch/x86/entry/common.c:86
entry_SYSCALL_64_after_hwframe+0x72/0xdc
value changed: 0x00000000 -> 0x00000001
Reported by Kernel Concurrency Sanitizer on:
CPU: 0 PID: 4891 Comm: systemd-coredum Not tainted 6.4.0-rc5-01219-gfa0e21fa4443 #5
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014
Severity ?
No CVSS data available.
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| Linux | Linux |
Affected:
9305cfa4443dbfb99faf35c5603ec0c0e91b5ef8 , < 31b46d5e7c4e295bd112960614a66a177a057dca
(git)
Affected: 9305cfa4443dbfb99faf35c5603ec0c0e91b5ef8 , < 20aa8325464d8905450089eed96ca102a074d853 (git) Affected: 9305cfa4443dbfb99faf35c5603ec0c0e91b5ef8 , < 5d91b7891f4a9a9d69d75e9f44ab4bf1f3b11840 (git) Affected: 9305cfa4443dbfb99faf35c5603ec0c0e91b5ef8 , < cf29b42766ad4af2ae6a449f583796951551b48d (git) Affected: 9305cfa4443dbfb99faf35c5603ec0c0e91b5ef8 , < e5edc6e44a882c0458878ab10eaddfe60ac34e57 (git) Affected: 9305cfa4443dbfb99faf35c5603ec0c0e91b5ef8 , < 2d8933ca863e252fb09ad0be483255e3dfeb1f54 (git) Affected: 9305cfa4443dbfb99faf35c5603ec0c0e91b5ef8 , < afc284a4a781defbb12b2a40427fae34c3d20e17 (git) Affected: 9305cfa4443dbfb99faf35c5603ec0c0e91b5ef8 , < ade32bd8a738d7497ffe9743c46728db26740f78 (git) |
|||||||
|
|||||||||
{
"containers": {
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Linux",
"programFiles": [
"net/unix/af_unix.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"lessThan": "31b46d5e7c4e295bd112960614a66a177a057dca",
"status": "affected",
"version": "9305cfa4443dbfb99faf35c5603ec0c0e91b5ef8",
"versionType": "git"
},
{
"lessThan": "20aa8325464d8905450089eed96ca102a074d853",
"status": "affected",
"version": "9305cfa4443dbfb99faf35c5603ec0c0e91b5ef8",
"versionType": "git"
},
{
"lessThan": "5d91b7891f4a9a9d69d75e9f44ab4bf1f3b11840",
"status": "affected",
"version": "9305cfa4443dbfb99faf35c5603ec0c0e91b5ef8",
"versionType": "git"
},
{
"lessThan": "cf29b42766ad4af2ae6a449f583796951551b48d",
"status": "affected",
"version": "9305cfa4443dbfb99faf35c5603ec0c0e91b5ef8",
"versionType": "git"
},
{
"lessThan": "e5edc6e44a882c0458878ab10eaddfe60ac34e57",
"status": "affected",
"version": "9305cfa4443dbfb99faf35c5603ec0c0e91b5ef8",
"versionType": "git"
},
{
"lessThan": "2d8933ca863e252fb09ad0be483255e3dfeb1f54",
"status": "affected",
"version": "9305cfa4443dbfb99faf35c5603ec0c0e91b5ef8",
"versionType": "git"
},
{
"lessThan": "afc284a4a781defbb12b2a40427fae34c3d20e17",
"status": "affected",
"version": "9305cfa4443dbfb99faf35c5603ec0c0e91b5ef8",
"versionType": "git"
},
{
"lessThan": "ade32bd8a738d7497ffe9743c46728db26740f78",
"status": "affected",
"version": "9305cfa4443dbfb99faf35c5603ec0c0e91b5ef8",
"versionType": "git"
}
]
},
{
"defaultStatus": "affected",
"product": "Linux",
"programFiles": [
"net/unix/af_unix.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"status": "affected",
"version": "2.6.24"
},
{
"lessThan": "2.6.24",
"status": "unaffected",
"version": "0",
"versionType": "semver"
},
{
"lessThanOrEqual": "4.14.*",
"status": "unaffected",
"version": "4.14.326",
"versionType": "semver"
},
{
"lessThanOrEqual": "4.19.*",
"status": "unaffected",
"version": "4.19.295",
"versionType": "semver"
},
{
"lessThanOrEqual": "5.4.*",
"status": "unaffected",
"version": "5.4.257",
"versionType": "semver"
},
{
"lessThanOrEqual": "5.10.*",
"status": "unaffected",
"version": "5.10.195",
"versionType": "semver"
},
{
"lessThanOrEqual": "5.15.*",
"status": "unaffected",
"version": "5.15.132",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.1.*",
"status": "unaffected",
"version": "6.1.54",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.5.*",
"status": "unaffected",
"version": "6.5.4",
"versionType": "semver"
},
{
"lessThanOrEqual": "*",
"status": "unaffected",
"version": "6.6",
"versionType": "original_commit_for_fix"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.14.326",
"versionStartIncluding": "2.6.24",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.19.295",
"versionStartIncluding": "2.6.24",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.4.257",
"versionStartIncluding": "2.6.24",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.10.195",
"versionStartIncluding": "2.6.24",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.15.132",
"versionStartIncluding": "2.6.24",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.1.54",
"versionStartIncluding": "2.6.24",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.5.4",
"versionStartIncluding": "2.6.24",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.6",
"versionStartIncluding": "2.6.24",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\naf_unix: Fix data-race around unix_tot_inflight.\n\nunix_tot_inflight is changed under spin_lock(unix_gc_lock), but\nunix_release_sock() reads it locklessly.\n\nLet\u0027s use READ_ONCE() for unix_tot_inflight.\n\nNote that the writer side was marked by commit 9d6d7f1cb67c (\"af_unix:\nannote lockless accesses to unix_tot_inflight \u0026 gc_in_progress\")\n\nBUG: KCSAN: data-race in unix_inflight / unix_release_sock\n\nwrite (marked) to 0xffffffff871852b8 of 4 bytes by task 123 on cpu 1:\n unix_inflight+0x130/0x180 net/unix/scm.c:64\n unix_attach_fds+0x137/0x1b0 net/unix/scm.c:123\n unix_scm_to_skb net/unix/af_unix.c:1832 [inline]\n unix_dgram_sendmsg+0x46a/0x14f0 net/unix/af_unix.c:1955\n sock_sendmsg_nosec net/socket.c:724 [inline]\n sock_sendmsg+0x148/0x160 net/socket.c:747\n ____sys_sendmsg+0x4e4/0x610 net/socket.c:2493\n ___sys_sendmsg+0xc6/0x140 net/socket.c:2547\n __sys_sendmsg+0x94/0x140 net/socket.c:2576\n __do_sys_sendmsg net/socket.c:2585 [inline]\n __se_sys_sendmsg net/socket.c:2583 [inline]\n __x64_sys_sendmsg+0x45/0x50 net/socket.c:2583\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x3b/0x90 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x72/0xdc\n\nread to 0xffffffff871852b8 of 4 bytes by task 4891 on cpu 0:\n unix_release_sock+0x608/0x910 net/unix/af_unix.c:671\n unix_release+0x59/0x80 net/unix/af_unix.c:1058\n __sock_release+0x7d/0x170 net/socket.c:653\n sock_close+0x19/0x30 net/socket.c:1385\n __fput+0x179/0x5e0 fs/file_table.c:321\n ____fput+0x15/0x20 fs/file_table.c:349\n task_work_run+0x116/0x1a0 kernel/task_work.c:179\n resume_user_mode_work include/linux/resume_user_mode.h:49 [inline]\n exit_to_user_mode_loop kernel/entry/common.c:171 [inline]\n exit_to_user_mode_prepare+0x174/0x180 kernel/entry/common.c:204\n __syscall_exit_to_user_mode_work kernel/entry/common.c:286 [inline]\n syscall_exit_to_user_mode+0x1a/0x30 kernel/entry/common.c:297\n do_syscall_64+0x4b/0x90 arch/x86/entry/common.c:86\n entry_SYSCALL_64_after_hwframe+0x72/0xdc\n\nvalue changed: 0x00000000 -\u003e 0x00000001\n\nReported by Kernel Concurrency Sanitizer on:\nCPU: 0 PID: 4891 Comm: systemd-coredum Not tainted 6.4.0-rc5-01219-gfa0e21fa4443 #5\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014"
}
],
"providerMetadata": {
"dateUpdated": "2025-12-24T10:55:40.534Z",
"orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"shortName": "Linux"
},
"references": [
{
"url": "https://git.kernel.org/stable/c/31b46d5e7c4e295bd112960614a66a177a057dca"
},
{
"url": "https://git.kernel.org/stable/c/20aa8325464d8905450089eed96ca102a074d853"
},
{
"url": "https://git.kernel.org/stable/c/5d91b7891f4a9a9d69d75e9f44ab4bf1f3b11840"
},
{
"url": "https://git.kernel.org/stable/c/cf29b42766ad4af2ae6a449f583796951551b48d"
},
{
"url": "https://git.kernel.org/stable/c/e5edc6e44a882c0458878ab10eaddfe60ac34e57"
},
{
"url": "https://git.kernel.org/stable/c/2d8933ca863e252fb09ad0be483255e3dfeb1f54"
},
{
"url": "https://git.kernel.org/stable/c/afc284a4a781defbb12b2a40427fae34c3d20e17"
},
{
"url": "https://git.kernel.org/stable/c/ade32bd8a738d7497ffe9743c46728db26740f78"
}
],
"title": "af_unix: Fix data-race around unix_tot_inflight.",
"x_generator": {
"engine": "bippy-1.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"assignerShortName": "Linux",
"cveId": "CVE-2023-54006",
"datePublished": "2025-12-24T10:55:40.534Z",
"dateReserved": "2025-12-24T10:53:46.177Z",
"dateUpdated": "2025-12-24T10:55:40.534Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2023-54006\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-12-24T11:15:53.527\",\"lastModified\":\"2025-12-29T15:58:56.260\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\naf_unix: Fix data-race around unix_tot_inflight.\\n\\nunix_tot_inflight is changed under spin_lock(unix_gc_lock), but\\nunix_release_sock() reads it locklessly.\\n\\nLet\u0027s use READ_ONCE() for unix_tot_inflight.\\n\\nNote that the writer side was marked by commit 9d6d7f1cb67c (\\\"af_unix:\\nannote lockless accesses to unix_tot_inflight \u0026 gc_in_progress\\\")\\n\\nBUG: KCSAN: data-race in unix_inflight / unix_release_sock\\n\\nwrite (marked) to 0xffffffff871852b8 of 4 bytes by task 123 on cpu 1:\\n unix_inflight+0x130/0x180 net/unix/scm.c:64\\n unix_attach_fds+0x137/0x1b0 net/unix/scm.c:123\\n unix_scm_to_skb net/unix/af_unix.c:1832 [inline]\\n unix_dgram_sendmsg+0x46a/0x14f0 net/unix/af_unix.c:1955\\n sock_sendmsg_nosec net/socket.c:724 [inline]\\n sock_sendmsg+0x148/0x160 net/socket.c:747\\n ____sys_sendmsg+0x4e4/0x610 net/socket.c:2493\\n ___sys_sendmsg+0xc6/0x140 net/socket.c:2547\\n __sys_sendmsg+0x94/0x140 net/socket.c:2576\\n __do_sys_sendmsg net/socket.c:2585 [inline]\\n __se_sys_sendmsg net/socket.c:2583 [inline]\\n __x64_sys_sendmsg+0x45/0x50 net/socket.c:2583\\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\\n do_syscall_64+0x3b/0x90 arch/x86/entry/common.c:80\\n entry_SYSCALL_64_after_hwframe+0x72/0xdc\\n\\nread to 0xffffffff871852b8 of 4 bytes by task 4891 on cpu 0:\\n unix_release_sock+0x608/0x910 net/unix/af_unix.c:671\\n unix_release+0x59/0x80 net/unix/af_unix.c:1058\\n __sock_release+0x7d/0x170 net/socket.c:653\\n sock_close+0x19/0x30 net/socket.c:1385\\n __fput+0x179/0x5e0 fs/file_table.c:321\\n ____fput+0x15/0x20 fs/file_table.c:349\\n task_work_run+0x116/0x1a0 kernel/task_work.c:179\\n resume_user_mode_work include/linux/resume_user_mode.h:49 [inline]\\n exit_to_user_mode_loop kernel/entry/common.c:171 [inline]\\n exit_to_user_mode_prepare+0x174/0x180 kernel/entry/common.c:204\\n __syscall_exit_to_user_mode_work kernel/entry/common.c:286 [inline]\\n syscall_exit_to_user_mode+0x1a/0x30 kernel/entry/common.c:297\\n do_syscall_64+0x4b/0x90 arch/x86/entry/common.c:86\\n entry_SYSCALL_64_after_hwframe+0x72/0xdc\\n\\nvalue changed: 0x00000000 -\u003e 0x00000001\\n\\nReported by Kernel Concurrency Sanitizer on:\\nCPU: 0 PID: 4891 Comm: systemd-coredum Not tainted 6.4.0-rc5-01219-gfa0e21fa4443 #5\\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/20aa8325464d8905450089eed96ca102a074d853\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/2d8933ca863e252fb09ad0be483255e3dfeb1f54\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/31b46d5e7c4e295bd112960614a66a177a057dca\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/5d91b7891f4a9a9d69d75e9f44ab4bf1f3b11840\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/ade32bd8a738d7497ffe9743c46728db26740f78\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/afc284a4a781defbb12b2a40427fae34c3d20e17\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/cf29b42766ad4af2ae6a449f583796951551b48d\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/e5edc6e44a882c0458878ab10eaddfe60ac34e57\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…