Instituto Nacional de ciberseguridad. Sección Incibe
Instituto Nacional de Ciberseguridad. Sección INCIBE-CERT

CVE-2023-54218

Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
30/12/2025
Última modificación:
30/12/2025

Descripción

*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> net: Fix load-tearing on sk-&gt;sk_stamp in sock_recv_cmsgs().<br /> <br /> KCSAN found a data race in sock_recv_cmsgs() where the read access<br /> to sk-&gt;sk_stamp needs READ_ONCE().<br /> <br /> BUG: KCSAN: data-race in packet_recvmsg / packet_recvmsg<br /> <br /> write (marked) to 0xffff88803c81f258 of 8 bytes by task 19171 on cpu 0:<br /> sock_write_timestamp include/net/sock.h:2670 [inline]<br /> sock_recv_cmsgs include/net/sock.h:2722 [inline]<br /> packet_recvmsg+0xb97/0xd00 net/packet/af_packet.c:3489<br /> sock_recvmsg_nosec net/socket.c:1019 [inline]<br /> sock_recvmsg+0x11a/0x130 net/socket.c:1040<br /> sock_read_iter+0x176/0x220 net/socket.c:1118<br /> call_read_iter include/linux/fs.h:1845 [inline]<br /> new_sync_read fs/read_write.c:389 [inline]<br /> vfs_read+0x5e0/0x630 fs/read_write.c:470<br /> ksys_read+0x163/0x1a0 fs/read_write.c:613<br /> __do_sys_read fs/read_write.c:623 [inline]<br /> __se_sys_read fs/read_write.c:621 [inline]<br /> __x64_sys_read+0x41/0x50 fs/read_write.c:621<br /> do_syscall_x64 arch/x86/entry/common.c:50 [inline]<br /> do_syscall_64+0x3b/0x90 arch/x86/entry/common.c:80<br /> entry_SYSCALL_64_after_hwframe+0x72/0xdc<br /> <br /> read to 0xffff88803c81f258 of 8 bytes by task 19183 on cpu 1:<br /> sock_recv_cmsgs include/net/sock.h:2721 [inline]<br /> packet_recvmsg+0xb64/0xd00 net/packet/af_packet.c:3489<br /> sock_recvmsg_nosec net/socket.c:1019 [inline]<br /> sock_recvmsg+0x11a/0x130 net/socket.c:1040<br /> sock_read_iter+0x176/0x220 net/socket.c:1118<br /> call_read_iter include/linux/fs.h:1845 [inline]<br /> new_sync_read fs/read_write.c:389 [inline]<br /> vfs_read+0x5e0/0x630 fs/read_write.c:470<br /> ksys_read+0x163/0x1a0 fs/read_write.c:613<br /> __do_sys_read fs/read_write.c:623 [inline]<br /> __se_sys_read fs/read_write.c:621 [inline]<br /> __x64_sys_read+0x41/0x50 fs/read_write.c:621<br /> do_syscall_x64 arch/x86/entry/common.c:50 [inline]<br /> do_syscall_64+0x3b/0x90 arch/x86/entry/common.c:80<br /> entry_SYSCALL_64_after_hwframe+0x72/0xdc<br /> <br /> value changed: 0xffffffffc4653600 -&gt; 0x0000000000000000<br /> <br /> Reported by Kernel Concurrency Sanitizer on:<br /> CPU: 1 PID: 19183 Comm: syz-executor.5 Not tainted 6.3.0-rc7-02330-gca6270c12e20 #2<br /> Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014

Impacto