目標達成 すべての支援者に感謝 — 100%達成しました!

目標: 1000 CNY · 調達済み: 1000 CNY

100.0%

CVE-2023-53345— Linux kernel 安全漏洞

EPSS 0.01% · P1
新しい脆弱性情報の通知を購読するログインして購読

I. CVE-2023-53345の基本情報

脆弱性情報

脆弱性についてご質問がありますか?Shenlongの分析が参考になるかご確認ください!
Shenlongの10の質問を表示 ↗

高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。

脆弱性タイトル
rxrpc: Fix potential data race in rxrpc_wait_to_be_connected()
ソース: NVD (National Vulnerability Database)
脆弱性説明
In the Linux kernel, the following vulnerability has been resolved: rxrpc: Fix potential data race in rxrpc_wait_to_be_connected() Inside the loop in rxrpc_wait_to_be_connected() it checks call->error to see if it should exit the loop without first checking the call state. This is probably safe as if call->error is set, the call is dead anyway, but we should probably wait for the call state to have been set to completion first, lest it cause surprise on the way out. Fix this by only accessing call->error if the call is complete. We don't actually need to access the error inside the loop as we'll do that after. This caused the following report: BUG: KCSAN: data-race in rxrpc_send_data / rxrpc_set_call_completion write to 0xffff888159cf3c50 of 4 bytes by task 25673 on cpu 1: rxrpc_set_call_completion+0x71/0x1c0 net/rxrpc/call_state.c:22 rxrpc_send_data_packet+0xba9/0x1650 net/rxrpc/output.c:479 rxrpc_transmit_one+0x1e/0x130 net/rxrpc/output.c:714 rxrpc_decant_prepared_tx net/rxrpc/call_event.c:326 [inline] rxrpc_transmit_some_data+0x496/0x600 net/rxrpc/call_event.c:350 rxrpc_input_call_event+0x564/0x1220 net/rxrpc/call_event.c:464 rxrpc_io_thread+0x307/0x1d80 net/rxrpc/io_thread.c:461 kthread+0x1ac/0x1e0 kernel/kthread.c:376 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:308 read to 0xffff888159cf3c50 of 4 bytes by task 25672 on cpu 0: rxrpc_send_data+0x29e/0x1950 net/rxrpc/sendmsg.c:296 rxrpc_do_sendmsg+0xb7a/0xc20 net/rxrpc/sendmsg.c:726 rxrpc_sendmsg+0x413/0x520 net/rxrpc/af_rxrpc.c:565 sock_sendmsg_nosec net/socket.c:724 [inline] sock_sendmsg net/socket.c:747 [inline] ____sys_sendmsg+0x375/0x4c0 net/socket.c:2501 ___sys_sendmsg net/socket.c:2555 [inline] __sys_sendmmsg+0x263/0x500 net/socket.c:2641 __do_sys_sendmmsg net/socket.c:2670 [inline] __se_sys_sendmmsg net/socket.c:2667 [inline] __x64_sys_sendmmsg+0x57/0x60 net/socket.c:2667 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x41/0xc0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd value changed: 0x00000000 -> 0xffffffea
ソース: NVD (National Vulnerability Database)
CVSS情報
N/A
ソース: NVD (National Vulnerability Database)
脆弱性タイプ
N/A
ソース: NVD (National Vulnerability Database)
脆弱性タイトル
Linux kernel 安全漏洞
ソース: CNNVD (China National Vulnerability Database)
脆弱性説明
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于rxrpc_wait_to_be_connected函数中未正确处理call状态和错误值,可能导致数据竞争。
ソース: CNNVD (China National Vulnerability Database)
CVSS情報
N/A
ソース: CNNVD (China National Vulnerability Database)
脆弱性タイプ
N/A
ソース: CNNVD (China National Vulnerability Database)

影響を受ける製品

ベンダープロダクト影響を受けるバージョンCPE購読
LinuxLinux 9d35d880e0e4a3ab32d8c12f9e4d76198aadd42d ~ 3e8ba61a3fe4475a9b5c9fbfc664435c6795d872 -
LinuxLinux 6.2 -

II. CVE-2023-53345の公開POC

#POC説明ソースリンクShenlongリンク
AI生成POCプレミアム

公開POCは見つかりませんでした。

ログインしてAI POCを生成

III. CVE-2023-53345のインテリジェンス情報

登录查看更多情报信息。

Same Patch Batch · Linux · 2025-09-17 · 56 CVEs total

CVE-2022-50370i2c: designware: Fix handling of real but unexpected device interrupts
CVE-2022-50355staging: vt6655: fix some erroneous memory clean-up loops
CVE-2022-50358brcmfmac: return error when getting invalid max_flowrings from dongle
CVE-2022-50356net: sched: sfb: fix null pointer access issue when sfb_init() fails
CVE-2022-50357usb: dwc3: core: fix some leaks in probe
CVE-2022-50359media: cx88: Fix a null-ptr-deref bug in buffer_prepare()
CVE-2022-50354drm/amdkfd: Fix kfd_process_device_init_vm error handling
CVE-2022-50367fs: fix UAF/GPF bug in nilfs_mdt_destroy
CVE-2022-50368drm/msm/dsi: fix memory corruption with too many bridges
CVE-2022-50369drm/vkms: Fix null-ptr-deref in vkms_release()
CVE-2022-50366powercap: intel_rapl: fix UBSAN shift-out-of-bounds issue
CVE-2022-50371led: qcom-lpg: Fix sleeping in atomic
CVE-2022-50372cifs: Fix memory leak when build ntlmssp negotiate blob failed
CVE-2022-50373fs: dlm: fix race in lowcomms
CVE-2022-50374Bluetooth: hci_{ldisc,serdev}: check percpu_init_rwsem() failure
CVE-2023-53335RDMA/cxgb4: Fix potential null-ptr-deref in pass_establish()
CVE-2023-53336media: ipu-bridge: Fix null pointer deref on SSDB/PLD parsing warnings
CVE-2023-53337nilfs2: do not write dirty data after degenerating to read-only
CVE-2023-53338lwt: Fix return values of BPF xmit ops
CVE-2023-53339btrfs: fix BUG_ON condition in btrfs_cancel_balance

Showing 20 of 56 CVEs. View all on vendor page →

IV. 関連脆弱性

V. CVE-2023-53345へのコメント

まだコメントはありません


コメントを残す