DEBIAN-CVE-2023-54226

Source
https://security-tracker.debian.org/tracker/CVE-2023-54226
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2023-54226.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2023-54226
Upstream
Published
2025-12-30T13:16:10.987Z
Modified
2025-12-31T11:19:56.997768Z
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved: afunix: Fix data races around sk->skshutdown. KCSAN found a data race around sk->skshutdown where unixreleasesock() and unixshutdown() update it under unixstatelock(), OTOH unixpoll() and unixdgrampoll() read it locklessly. We need to annotate the writes and reads with WRITEONCE() and READONCE(). BUG: KCSAN: data-race in unixpoll / unixreleasesock write to 0xffff88800d0f8aec of 1 bytes by task 264 on cpu 0: unixreleasesock+0x75c/0x910 net/unix/afunix.c:631 unixrelease+0x59/0x80 net/unix/afunix.c:1042 sockrelease+0x7d/0x170 net/socket.c:653 sockclose+0x19/0x30 net/socket.c:1397 _fput+0x179/0x5e0 fs/filetable.c:321 _fput+0x15/0x20 fs/filetable.c:349 taskworkrun+0x116/0x1a0 kernel/taskwork.c:179 resumeusermodework include/linux/resumeusermode.h:49 [inline] exittousermodeloop kernel/entry/common.c:171 [inline] exittousermodeprepare+0x174/0x180 kernel/entry/common.c:204 _syscallexittousermodework kernel/entry/common.c:286 [inline] syscallexittousermode+0x1a/0x30 kernel/entry/common.c:297 dosyscall64+0x4b/0x90 arch/x86/entry/common.c:86 entrySYSCALL64afterhwframe+0x72/0xdc read to 0xffff88800d0f8aec of 1 bytes by task 222 on cpu 1: unixpoll+0xa3/0x2a0 net/unix/afunix.c:3170 sockpoll+0xcf/0x2b0 net/socket.c:1385 vfspoll include/linux/poll.h:88 [inline] epitempoll.isra.0+0x78/0xc0 fs/eventpoll.c:855 epsendevents fs/eventpoll.c:1694 [inline] eppoll fs/eventpoll.c:1823 [inline] doepollwait+0x6c4/0xea0 fs/eventpoll.c:2258 _dosysepollwait fs/eventpoll.c:2270 [inline] _sesysepollwait fs/eventpoll.c:2265 [inline] _x64sysepollwait+0xcc/0x190 fs/eventpoll.c:2265 dosyscallx64 arch/x86/entry/common.c:50 [inline] dosyscall64+0x3b/0x90 arch/x86/entry/common.c:80 entrySYSCALL64afterhwframe+0x72/0xdc value changed: 0x00 -> 0x03 Reported by Kernel Concurrency Sanitizer on: CPU: 1 PID: 222 Comm: dbus-broker Not tainted 6.3.0-rc7-02330-gca6270c12e20 #2 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014

References

Affected packages

Debian:11 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.10.191-1

Affected versions

5.*
5.10.46-4
5.10.46-5
5.10.70-1~bpo10+1
5.10.70-1
5.10.84-1
5.10.92-1~bpo10+1
5.10.92-1
5.10.92-2
5.10.103-1~bpo10+1
5.10.103-1
5.10.106-1
5.10.113-1
5.10.120-1~bpo10+1
5.10.120-1
5.10.127-1
5.10.127-2~bpo10+1
5.10.127-2
5.10.136-1
5.10.140-1
5.10.148-1
5.10.149-1
5.10.149-2
5.10.158-1
5.10.158-2
5.10.162-1
5.10.178-1
5.10.178-2
5.10.178-3
5.10.179-1
5.10.179-2
5.10.179-3
5.10.179-4
5.10.179-5

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2023-54226.json"

Debian:12 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.1.37-1

Affected versions

6.*
6.1.27-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2023-54226.json"

Debian:13 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.3.7-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2023-54226.json"

Debian:14 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.3.7-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2023-54226.json"