Instituto Nacional de ciberseguridad. Sección Incibe
Instituto Nacional de Ciberseguridad. Sección INCIBE-CERT

CVE-2023-53824

Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
09/12/2025
Última modificación:
09/12/2025

Descripción

*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> netlink: annotate lockless accesses to nlk-&gt;max_recvmsg_len<br /> <br /> syzbot reported a data-race in data-race in netlink_recvmsg() [1]<br /> <br /> Indeed, netlink_recvmsg() can be run concurrently,<br /> and netlink_dump() also needs protection.<br /> <br /> [1]<br /> BUG: KCSAN: data-race in netlink_recvmsg / netlink_recvmsg<br /> <br /> read to 0xffff888141840b38 of 8 bytes by task 23057 on cpu 0:<br /> netlink_recvmsg+0xea/0x730 net/netlink/af_netlink.c:1988<br /> sock_recvmsg_nosec net/socket.c:1017 [inline]<br /> sock_recvmsg net/socket.c:1038 [inline]<br /> __sys_recvfrom+0x1ee/0x2e0 net/socket.c:2194<br /> __do_sys_recvfrom net/socket.c:2212 [inline]<br /> __se_sys_recvfrom net/socket.c:2208 [inline]<br /> __x64_sys_recvfrom+0x78/0x90 net/socket.c:2208<br /> do_syscall_x64 arch/x86/entry/common.c:50 [inline]<br /> do_syscall_64+0x41/0xc0 arch/x86/entry/common.c:80<br /> entry_SYSCALL_64_after_hwframe+0x63/0xcd<br /> <br /> write to 0xffff888141840b38 of 8 bytes by task 23037 on cpu 1:<br /> netlink_recvmsg+0x114/0x730 net/netlink/af_netlink.c:1989<br /> sock_recvmsg_nosec net/socket.c:1017 [inline]<br /> sock_recvmsg net/socket.c:1038 [inline]<br /> ____sys_recvmsg+0x156/0x310 net/socket.c:2720<br /> ___sys_recvmsg net/socket.c:2762 [inline]<br /> do_recvmmsg+0x2e5/0x710 net/socket.c:2856<br /> __sys_recvmmsg net/socket.c:2935 [inline]<br /> __do_sys_recvmmsg net/socket.c:2958 [inline]<br /> __se_sys_recvmmsg net/socket.c:2951 [inline]<br /> __x64_sys_recvmmsg+0xe2/0x160 net/socket.c:2951<br /> do_syscall_x64 arch/x86/entry/common.c:50 [inline]<br /> do_syscall_64+0x41/0xc0 arch/x86/entry/common.c:80<br /> entry_SYSCALL_64_after_hwframe+0x63/0xcd<br /> <br /> value changed: 0x0000000000000000 -&gt; 0x0000000000001000<br /> <br /> Reported by Kernel Concurrency Sanitizer on:<br /> CPU: 1 PID: 23037 Comm: syz-executor.2 Not tainted 6.3.0-rc4-syzkaller-00195-g5a57b48fdfcb #0<br /> Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023

Impacto