CVE-2023-53853
BaseFortify
Publication date: 2025-12-09
Last updated on: 2025-12-09
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a data race condition in the Linux kernel's netlink subsystem. Specifically, the issue involves concurrent lockless accesses to the 'cb_running' field in netlink structures by functions like netlink_recvmsg() and netlink_native_seq_show(). The fix involved using READ_ONCE() and WRITE_ONCE() macros to ensure proper atomic access and prevent race conditions during reads and writes to this field.
How can this vulnerability impact me? :
The data race condition could lead to unpredictable behavior in the netlink communication subsystem of the Linux kernel, potentially causing kernel crashes, data corruption, or other stability issues. This could impact system reliability and security, especially in environments relying on netlink for kernel-user communication.