CVE-2023-54218
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
30/12/2025
Última modificación:
30/12/2025
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
net: Fix load-tearing on sk->sk_stamp in sock_recv_cmsgs().<br />
<br />
KCSAN found a data race in sock_recv_cmsgs() where the read access<br />
to sk->sk_stamp needs READ_ONCE().<br />
<br />
BUG: KCSAN: data-race in packet_recvmsg / packet_recvmsg<br />
<br />
write (marked) to 0xffff88803c81f258 of 8 bytes by task 19171 on cpu 0:<br />
sock_write_timestamp include/net/sock.h:2670 [inline]<br />
sock_recv_cmsgs include/net/sock.h:2722 [inline]<br />
packet_recvmsg+0xb97/0xd00 net/packet/af_packet.c:3489<br />
sock_recvmsg_nosec net/socket.c:1019 [inline]<br />
sock_recvmsg+0x11a/0x130 net/socket.c:1040<br />
sock_read_iter+0x176/0x220 net/socket.c:1118<br />
call_read_iter include/linux/fs.h:1845 [inline]<br />
new_sync_read fs/read_write.c:389 [inline]<br />
vfs_read+0x5e0/0x630 fs/read_write.c:470<br />
ksys_read+0x163/0x1a0 fs/read_write.c:613<br />
__do_sys_read fs/read_write.c:623 [inline]<br />
__se_sys_read fs/read_write.c:621 [inline]<br />
__x64_sys_read+0x41/0x50 fs/read_write.c:621<br />
do_syscall_x64 arch/x86/entry/common.c:50 [inline]<br />
do_syscall_64+0x3b/0x90 arch/x86/entry/common.c:80<br />
entry_SYSCALL_64_after_hwframe+0x72/0xdc<br />
<br />
read to 0xffff88803c81f258 of 8 bytes by task 19183 on cpu 1:<br />
sock_recv_cmsgs include/net/sock.h:2721 [inline]<br />
packet_recvmsg+0xb64/0xd00 net/packet/af_packet.c:3489<br />
sock_recvmsg_nosec net/socket.c:1019 [inline]<br />
sock_recvmsg+0x11a/0x130 net/socket.c:1040<br />
sock_read_iter+0x176/0x220 net/socket.c:1118<br />
call_read_iter include/linux/fs.h:1845 [inline]<br />
new_sync_read fs/read_write.c:389 [inline]<br />
vfs_read+0x5e0/0x630 fs/read_write.c:470<br />
ksys_read+0x163/0x1a0 fs/read_write.c:613<br />
__do_sys_read fs/read_write.c:623 [inline]<br />
__se_sys_read fs/read_write.c:621 [inline]<br />
__x64_sys_read+0x41/0x50 fs/read_write.c:621<br />
do_syscall_x64 arch/x86/entry/common.c:50 [inline]<br />
do_syscall_64+0x3b/0x90 arch/x86/entry/common.c:80<br />
entry_SYSCALL_64_after_hwframe+0x72/0xdc<br />
<br />
value changed: 0xffffffffc4653600 -> 0x0000000000000000<br />
<br />
Reported by Kernel Concurrency Sanitizer on:<br />
CPU: 1 PID: 19183 Comm: syz-executor.5 Not tainted 6.3.0-rc7-02330-gca6270c12e20 #2<br />
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014
Impacto
Referencias a soluciones, herramientas e información
- https://git.kernel.org/stable/c/564c3150ad357d571a0de7d8b644aa1f7e6e21b7
- https://git.kernel.org/stable/c/7145f2309d649ad6273b9f66448321b9b4c523c8
- https://git.kernel.org/stable/c/8319220054e5ea5f506d8d4c4b5e234f668ffc3b
- https://git.kernel.org/stable/c/d06f67b2b8dcd00d995c468428b6bccebc5762d8
- https://git.kernel.org/stable/c/d7343f8de019ebb55b2b6ef79b971f6ceb361a99
- https://git.kernel.org/stable/c/de260d1e02cde39d317066835ee6e5234fc9f5a8
- https://git.kernel.org/stable/c/dfd9248c071a3710c24365897459538551cb7167
- https://git.kernel.org/stable/c/fd28692fa182d25e8d26bc1db506648839fde245



