DEBIAN-CVE-2023-53836

Source
https://security-tracker.debian.org/tracker/CVE-2023-53836
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2023-53836.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2023-53836
Upstream
Published
2025-12-09T16:17:22.887Z
Modified
2025-12-10T11:16:08.101870Z
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved: bpf, sockmap: Fix skb refcnt race after locking changes There is a race where skb's from the skpsockbacklog can be referenced after userspace side has already skbconsumed() the skbuff and its refcnt dropped to zer0 causing use after free. The flow is the following: while ((skb = skbpeek(&psock->ingressskb)) skpsockhandleSkb(psock, skb, ..., ingress) if (!ingress) ... skpsockskbingress skpsockskbingressenqueue(skb) msg->skb = skb skpsockqueuemsg(psock, msg) skbdequeue(&psock->ingressskb) The skpsockqueuemsg() puts the msg on the ingressmsg queue. This is what the application reads when recvmsg() is called. An application can read this anytime after the msg is placed on the queue. The recvmsg hook will also read msg->skb and then after user space reads the msg will call consumeskb(skb) on it effectively free'ing it. But, the race is in above where backlog queue still has a reference to the skb and calls skbdequeue(). If the skbdequeue happens after the user reads and free's the skb we have a use after free. The !ingress case does not suffer from this problem because it uses sendmsg_*(sk, msg) which does not pass the skbuff further down the stack. The following splat was observed with 'testprogs -t sockmaplisten': [ 1022.710250][ T2556] general protection fault, ... [...] [ 1022.712830][ T2556] Workqueue: events skpsockbacklog [ 1022.713262][ T2556] RIP: 0010:skbdequeue+0x4c/0x80 [ 1022.713653][ T2556] Code: ... [...] [ 1022.720699][ T2556] Call Trace: [ 1022.720984][ T2556] <TASK> [ 1022.721254][ T2556] ? dieaddr+0x32/0x80^M [ 1022.721589][ T2556] ? excgeneralprotection+0x25a/0x4b0 [ 1022.722026][ T2556] ? asmexcgeneralprotection+0x22/0x30 [ 1022.722489][ T2556] ? skbdequeue+0x4c/0x80 [ 1022.722854][ T2556] skpsockbacklog+0x27a/0x300 [ 1022.723243][ T2556] processonework+0x2a7/0x5b0 [ 1022.723633][ T2556] workerthread+0x4f/0x3a0 [ 1022.723998][ T2556] ? __pfxworkerthread+0x10/0x10 [ 1022.724386][ T2556] kthread+0xfd/0x130 [ 1022.724709][ T2556] ? __pfxkthread+0x10/0x10 [ 1022.725066][ T2556] retfrom_fork+0x2d/0x50 [ 1022.725409][ T2556] ? _pfxkthread+0x10/0x10 [ 1022.725799][ T2556] retfromforkasm+0x1b/0x30 [ 1022.726201][ T2556] </TASK> To fix we add an skbget() before passing the skb to be enqueued in the engress queue. This bumps the skb->users refcnt so that consumeskb() and kfreeskb will not immediately free the skbuff. With this we can be sure the skb is still around when we do the dequeue. Then we just need to decrement the refcnt or free the skb in the backlog case which we do by calling kfreeskb() on the ingress case as well as the sendmsg case. Before locking change from fixes tag we had the sock locked so we couldn't race with user and there was no issue here.

References

Affected packages

Debian:12 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.1.55-1

Affected versions

6.*
6.1.27-1
6.1.37-1
6.1.38-1
6.1.38-2~bpo11+1
6.1.38-2
6.1.38-3
6.1.38-4~bpo11+1
6.1.38-4
6.1.52-1
6.1.55-1~bpo11+1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2023-53836.json"

Debian:13 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.5.6-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2023-53836.json"

Debian:14 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.5.6-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2023-53836.json"