CVE-2023-54283
Data Race Vulnerability in Linux Kernel BPF LRU List Component
Publication date: 2025-12-30
Last updated on: 2025-12-30
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a data-race condition in the Linux kernel's BPF (Berkeley Packet Filter) subsystem, specifically in the bpf_lru_list component. The Kernel Concurrency Sanitizer (KCSAN) reported a race condition when accessing the node->ref variable. Although the exact value of node->ref does not have to be accurate, the issue was addressed by changing the code to use safer READ_ONCE() and WRITE_ONCE() patterns to prevent data races. Additional functions were added to properly clear the reference count to avoid concurrent access issues.
How can this vulnerability impact me? :
This vulnerability could lead to unpredictable behavior in the kernel due to concurrent access to shared data without proper synchronization. While it may not directly cause a security breach, data races can lead to system instability, crashes, or corrupted data within the BPF subsystem, potentially affecting system reliability and performance.