CVE-2023-54226
Data Race Vulnerability in Linux Kernel af_unix Socket Handling
Publication date: 2025-12-30
Last updated on: 2025-12-30
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.3.0-rc7 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a data race condition in the Linux kernel's af_unix subsystem. Specifically, the sk->sk_shutdown variable is accessed concurrently without proper synchronization: some functions write to it under a lock (unix_state_lock), while others read it without any locking. This can lead to inconsistent or unexpected behavior. The fix involves using WRITE_ONCE() and READ_ONCE() annotations to ensure proper atomic access and prevent data races.
How can this vulnerability impact me? :
The data race around sk->sk_shutdown can cause unpredictable behavior in the handling of Unix domain sockets, potentially leading to kernel instability or crashes. This could affect system reliability and the correct functioning of applications relying on these sockets.