CVE-2023-53824
BaseFortify
Publication date: 2025-12-09
Last updated on: 2025-12-09
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.3.0-rc4 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a data race in the Linux kernel's netlink_recvmsg() function. It occurs because netlink_recvmsg() can be run concurrently without proper synchronization, leading to unsafe concurrent accesses to the max_recvmsg_len field. This issue was detected by the Kernel Concurrency Sanitizer and involves simultaneous read and write operations on the same memory location, which can cause unpredictable behavior or crashes.
How can this vulnerability impact me? :
The data race in netlink_recvmsg() can lead to unpredictable kernel behavior, including potential crashes or corruption of kernel data structures. This can affect system stability and reliability, potentially causing denial of service or other unintended side effects in systems using the affected Linux kernel versions.