CVE-2023-54006 (GCVE-0-2023-54006)

Vulnerability from cvelistv5 – Published: 2025-12-24 10:55 – Updated: 2025-12-24 10:55
VLAI?
Title
af_unix: Fix data-race around unix_tot_inflight.
Summary
In the Linux kernel, the following vulnerability has been resolved: af_unix: Fix data-race around unix_tot_inflight. unix_tot_inflight is changed under spin_lock(unix_gc_lock), but unix_release_sock() reads it locklessly. Let's use READ_ONCE() for unix_tot_inflight. Note that the writer side was marked by commit 9d6d7f1cb67c ("af_unix: annote lockless accesses to unix_tot_inflight & gc_in_progress") BUG: KCSAN: data-race in unix_inflight / unix_release_sock write (marked) to 0xffffffff871852b8 of 4 bytes by task 123 on cpu 1: unix_inflight+0x130/0x180 net/unix/scm.c:64 unix_attach_fds+0x137/0x1b0 net/unix/scm.c:123 unix_scm_to_skb net/unix/af_unix.c:1832 [inline] unix_dgram_sendmsg+0x46a/0x14f0 net/unix/af_unix.c:1955 sock_sendmsg_nosec net/socket.c:724 [inline] sock_sendmsg+0x148/0x160 net/socket.c:747 ____sys_sendmsg+0x4e4/0x610 net/socket.c:2493 ___sys_sendmsg+0xc6/0x140 net/socket.c:2547 __sys_sendmsg+0x94/0x140 net/socket.c:2576 __do_sys_sendmsg net/socket.c:2585 [inline] __se_sys_sendmsg net/socket.c:2583 [inline] __x64_sys_sendmsg+0x45/0x50 net/socket.c:2583 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x3b/0x90 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x72/0xdc read to 0xffffffff871852b8 of 4 bytes by task 4891 on cpu 0: unix_release_sock+0x608/0x910 net/unix/af_unix.c:671 unix_release+0x59/0x80 net/unix/af_unix.c:1058 __sock_release+0x7d/0x170 net/socket.c:653 sock_close+0x19/0x30 net/socket.c:1385 __fput+0x179/0x5e0 fs/file_table.c:321 ____fput+0x15/0x20 fs/file_table.c:349 task_work_run+0x116/0x1a0 kernel/task_work.c:179 resume_user_mode_work include/linux/resume_user_mode.h:49 [inline] exit_to_user_mode_loop kernel/entry/common.c:171 [inline] exit_to_user_mode_prepare+0x174/0x180 kernel/entry/common.c:204 __syscall_exit_to_user_mode_work kernel/entry/common.c:286 [inline] syscall_exit_to_user_mode+0x1a/0x30 kernel/entry/common.c:297 do_syscall_64+0x4b/0x90 arch/x86/entry/common.c:86 entry_SYSCALL_64_after_hwframe+0x72/0xdc value changed: 0x00000000 -> 0x00000001 Reported by Kernel Concurrency Sanitizer on: CPU: 0 PID: 4891 Comm: systemd-coredum Not tainted 6.4.0-rc5-01219-gfa0e21fa4443 #5 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014
Severity ?
No CVSS data available.
Assigner
Impacted products
Vendor Product Version
Linux Linux Affected: 9305cfa4443dbfb99faf35c5603ec0c0e91b5ef8 , < 31b46d5e7c4e295bd112960614a66a177a057dca (git)
Affected: 9305cfa4443dbfb99faf35c5603ec0c0e91b5ef8 , < 20aa8325464d8905450089eed96ca102a074d853 (git)
Affected: 9305cfa4443dbfb99faf35c5603ec0c0e91b5ef8 , < 5d91b7891f4a9a9d69d75e9f44ab4bf1f3b11840 (git)
Affected: 9305cfa4443dbfb99faf35c5603ec0c0e91b5ef8 , < cf29b42766ad4af2ae6a449f583796951551b48d (git)
Affected: 9305cfa4443dbfb99faf35c5603ec0c0e91b5ef8 , < e5edc6e44a882c0458878ab10eaddfe60ac34e57 (git)
Affected: 9305cfa4443dbfb99faf35c5603ec0c0e91b5ef8 , < 2d8933ca863e252fb09ad0be483255e3dfeb1f54 (git)
Affected: 9305cfa4443dbfb99faf35c5603ec0c0e91b5ef8 , < afc284a4a781defbb12b2a40427fae34c3d20e17 (git)
Affected: 9305cfa4443dbfb99faf35c5603ec0c0e91b5ef8 , < ade32bd8a738d7497ffe9743c46728db26740f78 (git)
Create a notification for this product.
    Linux Linux Affected: 2.6.24
Unaffected: 0 , < 2.6.24 (semver)
Unaffected: 4.14.326 , ≤ 4.14.* (semver)
Unaffected: 4.19.295 , ≤ 4.19.* (semver)
Unaffected: 5.4.257 , ≤ 5.4.* (semver)
Unaffected: 5.10.195 , ≤ 5.10.* (semver)
Unaffected: 5.15.132 , ≤ 5.15.* (semver)
Unaffected: 6.1.54 , ≤ 6.1.* (semver)
Unaffected: 6.5.4 , ≤ 6.5.* (semver)
Unaffected: 6.6 , ≤ * (original_commit_for_fix)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "net/unix/af_unix.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "31b46d5e7c4e295bd112960614a66a177a057dca",
              "status": "affected",
              "version": "9305cfa4443dbfb99faf35c5603ec0c0e91b5ef8",
              "versionType": "git"
            },
            {
              "lessThan": "20aa8325464d8905450089eed96ca102a074d853",
              "status": "affected",
              "version": "9305cfa4443dbfb99faf35c5603ec0c0e91b5ef8",
              "versionType": "git"
            },
            {
              "lessThan": "5d91b7891f4a9a9d69d75e9f44ab4bf1f3b11840",
              "status": "affected",
              "version": "9305cfa4443dbfb99faf35c5603ec0c0e91b5ef8",
              "versionType": "git"
            },
            {
              "lessThan": "cf29b42766ad4af2ae6a449f583796951551b48d",
              "status": "affected",
              "version": "9305cfa4443dbfb99faf35c5603ec0c0e91b5ef8",
              "versionType": "git"
            },
            {
              "lessThan": "e5edc6e44a882c0458878ab10eaddfe60ac34e57",
              "status": "affected",
              "version": "9305cfa4443dbfb99faf35c5603ec0c0e91b5ef8",
              "versionType": "git"
            },
            {
              "lessThan": "2d8933ca863e252fb09ad0be483255e3dfeb1f54",
              "status": "affected",
              "version": "9305cfa4443dbfb99faf35c5603ec0c0e91b5ef8",
              "versionType": "git"
            },
            {
              "lessThan": "afc284a4a781defbb12b2a40427fae34c3d20e17",
              "status": "affected",
              "version": "9305cfa4443dbfb99faf35c5603ec0c0e91b5ef8",
              "versionType": "git"
            },
            {
              "lessThan": "ade32bd8a738d7497ffe9743c46728db26740f78",
              "status": "affected",
              "version": "9305cfa4443dbfb99faf35c5603ec0c0e91b5ef8",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "net/unix/af_unix.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "2.6.24"
            },
            {
              "lessThan": "2.6.24",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.14.*",
              "status": "unaffected",
              "version": "4.14.326",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.19.*",
              "status": "unaffected",
              "version": "4.19.295",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.4.*",
              "status": "unaffected",
              "version": "5.4.257",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.10.*",
              "status": "unaffected",
              "version": "5.10.195",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.15.*",
              "status": "unaffected",
              "version": "5.15.132",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.*",
              "status": "unaffected",
              "version": "6.1.54",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.5.*",
              "status": "unaffected",
              "version": "6.5.4",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.6",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "4.14.326",
                  "versionStartIncluding": "2.6.24",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "4.19.295",
                  "versionStartIncluding": "2.6.24",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.4.257",
                  "versionStartIncluding": "2.6.24",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.10.195",
                  "versionStartIncluding": "2.6.24",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.15.132",
                  "versionStartIncluding": "2.6.24",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.1.54",
                  "versionStartIncluding": "2.6.24",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.5.4",
                  "versionStartIncluding": "2.6.24",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.6",
                  "versionStartIncluding": "2.6.24",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\naf_unix: Fix data-race around unix_tot_inflight.\n\nunix_tot_inflight is changed under spin_lock(unix_gc_lock), but\nunix_release_sock() reads it locklessly.\n\nLet\u0027s use READ_ONCE() for unix_tot_inflight.\n\nNote that the writer side was marked by commit 9d6d7f1cb67c (\"af_unix:\nannote lockless accesses to unix_tot_inflight \u0026 gc_in_progress\")\n\nBUG: KCSAN: data-race in unix_inflight / unix_release_sock\n\nwrite (marked) to 0xffffffff871852b8 of 4 bytes by task 123 on cpu 1:\n unix_inflight+0x130/0x180 net/unix/scm.c:64\n unix_attach_fds+0x137/0x1b0 net/unix/scm.c:123\n unix_scm_to_skb net/unix/af_unix.c:1832 [inline]\n unix_dgram_sendmsg+0x46a/0x14f0 net/unix/af_unix.c:1955\n sock_sendmsg_nosec net/socket.c:724 [inline]\n sock_sendmsg+0x148/0x160 net/socket.c:747\n ____sys_sendmsg+0x4e4/0x610 net/socket.c:2493\n ___sys_sendmsg+0xc6/0x140 net/socket.c:2547\n __sys_sendmsg+0x94/0x140 net/socket.c:2576\n __do_sys_sendmsg net/socket.c:2585 [inline]\n __se_sys_sendmsg net/socket.c:2583 [inline]\n __x64_sys_sendmsg+0x45/0x50 net/socket.c:2583\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x3b/0x90 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x72/0xdc\n\nread to 0xffffffff871852b8 of 4 bytes by task 4891 on cpu 0:\n unix_release_sock+0x608/0x910 net/unix/af_unix.c:671\n unix_release+0x59/0x80 net/unix/af_unix.c:1058\n __sock_release+0x7d/0x170 net/socket.c:653\n sock_close+0x19/0x30 net/socket.c:1385\n __fput+0x179/0x5e0 fs/file_table.c:321\n ____fput+0x15/0x20 fs/file_table.c:349\n task_work_run+0x116/0x1a0 kernel/task_work.c:179\n resume_user_mode_work include/linux/resume_user_mode.h:49 [inline]\n exit_to_user_mode_loop kernel/entry/common.c:171 [inline]\n exit_to_user_mode_prepare+0x174/0x180 kernel/entry/common.c:204\n __syscall_exit_to_user_mode_work kernel/entry/common.c:286 [inline]\n syscall_exit_to_user_mode+0x1a/0x30 kernel/entry/common.c:297\n do_syscall_64+0x4b/0x90 arch/x86/entry/common.c:86\n entry_SYSCALL_64_after_hwframe+0x72/0xdc\n\nvalue changed: 0x00000000 -\u003e 0x00000001\n\nReported by Kernel Concurrency Sanitizer on:\nCPU: 0 PID: 4891 Comm: systemd-coredum Not tainted 6.4.0-rc5-01219-gfa0e21fa4443 #5\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014"
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-12-24T10:55:40.534Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/31b46d5e7c4e295bd112960614a66a177a057dca"
        },
        {
          "url": "https://git.kernel.org/stable/c/20aa8325464d8905450089eed96ca102a074d853"
        },
        {
          "url": "https://git.kernel.org/stable/c/5d91b7891f4a9a9d69d75e9f44ab4bf1f3b11840"
        },
        {
          "url": "https://git.kernel.org/stable/c/cf29b42766ad4af2ae6a449f583796951551b48d"
        },
        {
          "url": "https://git.kernel.org/stable/c/e5edc6e44a882c0458878ab10eaddfe60ac34e57"
        },
        {
          "url": "https://git.kernel.org/stable/c/2d8933ca863e252fb09ad0be483255e3dfeb1f54"
        },
        {
          "url": "https://git.kernel.org/stable/c/afc284a4a781defbb12b2a40427fae34c3d20e17"
        },
        {
          "url": "https://git.kernel.org/stable/c/ade32bd8a738d7497ffe9743c46728db26740f78"
        }
      ],
      "title": "af_unix: Fix data-race around unix_tot_inflight.",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2023-54006",
    "datePublished": "2025-12-24T10:55:40.534Z",
    "dateReserved": "2025-12-24T10:53:46.177Z",
    "dateUpdated": "2025-12-24T10:55:40.534Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2023-54006\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-12-24T11:15:53.527\",\"lastModified\":\"2025-12-29T15:58:56.260\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\naf_unix: Fix data-race around unix_tot_inflight.\\n\\nunix_tot_inflight is changed under spin_lock(unix_gc_lock), but\\nunix_release_sock() reads it locklessly.\\n\\nLet\u0027s use READ_ONCE() for unix_tot_inflight.\\n\\nNote that the writer side was marked by commit 9d6d7f1cb67c (\\\"af_unix:\\nannote lockless accesses to unix_tot_inflight \u0026 gc_in_progress\\\")\\n\\nBUG: KCSAN: data-race in unix_inflight / unix_release_sock\\n\\nwrite (marked) to 0xffffffff871852b8 of 4 bytes by task 123 on cpu 1:\\n unix_inflight+0x130/0x180 net/unix/scm.c:64\\n unix_attach_fds+0x137/0x1b0 net/unix/scm.c:123\\n unix_scm_to_skb net/unix/af_unix.c:1832 [inline]\\n unix_dgram_sendmsg+0x46a/0x14f0 net/unix/af_unix.c:1955\\n sock_sendmsg_nosec net/socket.c:724 [inline]\\n sock_sendmsg+0x148/0x160 net/socket.c:747\\n ____sys_sendmsg+0x4e4/0x610 net/socket.c:2493\\n ___sys_sendmsg+0xc6/0x140 net/socket.c:2547\\n __sys_sendmsg+0x94/0x140 net/socket.c:2576\\n __do_sys_sendmsg net/socket.c:2585 [inline]\\n __se_sys_sendmsg net/socket.c:2583 [inline]\\n __x64_sys_sendmsg+0x45/0x50 net/socket.c:2583\\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\\n do_syscall_64+0x3b/0x90 arch/x86/entry/common.c:80\\n entry_SYSCALL_64_after_hwframe+0x72/0xdc\\n\\nread to 0xffffffff871852b8 of 4 bytes by task 4891 on cpu 0:\\n unix_release_sock+0x608/0x910 net/unix/af_unix.c:671\\n unix_release+0x59/0x80 net/unix/af_unix.c:1058\\n __sock_release+0x7d/0x170 net/socket.c:653\\n sock_close+0x19/0x30 net/socket.c:1385\\n __fput+0x179/0x5e0 fs/file_table.c:321\\n ____fput+0x15/0x20 fs/file_table.c:349\\n task_work_run+0x116/0x1a0 kernel/task_work.c:179\\n resume_user_mode_work include/linux/resume_user_mode.h:49 [inline]\\n exit_to_user_mode_loop kernel/entry/common.c:171 [inline]\\n exit_to_user_mode_prepare+0x174/0x180 kernel/entry/common.c:204\\n __syscall_exit_to_user_mode_work kernel/entry/common.c:286 [inline]\\n syscall_exit_to_user_mode+0x1a/0x30 kernel/entry/common.c:297\\n do_syscall_64+0x4b/0x90 arch/x86/entry/common.c:86\\n entry_SYSCALL_64_after_hwframe+0x72/0xdc\\n\\nvalue changed: 0x00000000 -\u003e 0x00000001\\n\\nReported by Kernel Concurrency Sanitizer on:\\nCPU: 0 PID: 4891 Comm: systemd-coredum Not tainted 6.4.0-rc5-01219-gfa0e21fa4443 #5\\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/20aa8325464d8905450089eed96ca102a074d853\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/2d8933ca863e252fb09ad0be483255e3dfeb1f54\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/31b46d5e7c4e295bd112960614a66a177a057dca\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/5d91b7891f4a9a9d69d75e9f44ab4bf1f3b11840\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/ade32bd8a738d7497ffe9743c46728db26740f78\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/afc284a4a781defbb12b2a40427fae34c3d20e17\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/cf29b42766ad4af2ae6a449f583796951551b48d\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/e5edc6e44a882c0458878ab10eaddfe60ac34e57\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…