CVE-2023-53731 (GCVE-0-2023-53731)
Vulnerability from cvelistv5
Published
2025-10-22 13:23
Modified
2025-10-22 13:23
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: netlink: fix potential deadlock in netlink_set_err() syzbot reported a possible deadlock in netlink_set_err() [1] A similar issue was fixed in commit 1d482e666b8e ("netlink: disable IRQs for netlink_lock_table()") in netlink_lock_table() This patch adds IRQ safety to netlink_set_err() and __netlink_diag_dump() which were not covered by cited commit. [1] WARNING: possible irq lock inversion dependency detected 6.4.0-rc6-syzkaller-00240-g4e9f0ec38852 #0 Not tainted syz-executor.2/23011 just changed the state of lock: ffffffff8e1a7a58 (nl_table_lock){.+.?}-{2:2}, at: netlink_set_err+0x2e/0x3a0 net/netlink/af_netlink.c:1612 but this lock was taken by another, SOFTIRQ-safe lock in the past: (&local->queue_stop_reason_lock){..-.}-{2:2} and interrupts could create inverse lock ordering between them. other info that might help us debug this: Possible interrupt unsafe locking scenario: CPU0 CPU1 ---- ---- lock(nl_table_lock); local_irq_disable(); lock(&local->queue_stop_reason_lock); lock(nl_table_lock); <Interrupt> lock(&local->queue_stop_reason_lock); *** DEADLOCK ***
Impacted products
Vendor Product Version
Linux Linux Version: 82b2ea5f904b3826934df4a00f3b8806272185f6
Version: 59fba11d649854134c75ad88c8adafa9304ac419
Version: 21df0c2e7d195de4a3c650de9361b3037fa6c59a
Version: 1d6d43d4805da9b3fa0f5841e8b1083c89868f35
Version: 1d482e666b8e74c7555dbdfbfb77205eeed3ff2d
Version: 1d482e666b8e74c7555dbdfbfb77205eeed3ff2d
Version: 1d482e666b8e74c7555dbdfbfb77205eeed3ff2d
Version: 1d482e666b8e74c7555dbdfbfb77205eeed3ff2d
Version: 1d482e666b8e74c7555dbdfbfb77205eeed3ff2d
Version: 5f155c4046200f067b1dc3140ea99ef56e4e0b74
Version: a8e9111a8625dd11e70edd61f7a1ccd26c041442
Version: 76cc8e04f38c2bbfcba07f62864a011f142bd40c
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "net/netlink/af_netlink.c",
            "net/netlink/diag.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "c09e8e3f7fd432984bf5422302b093d2371dfc48",
              "status": "affected",
              "version": "82b2ea5f904b3826934df4a00f3b8806272185f6",
              "versionType": "git"
            },
            {
              "lessThan": "4b9adb8d4a62ff7608d4a7d4eb42036a88f30980",
              "status": "affected",
              "version": "59fba11d649854134c75ad88c8adafa9304ac419",
              "versionType": "git"
            },
            {
              "lessThan": "8f6652ed2ad98fe6d13b903483d9257762ab2ec6",
              "status": "affected",
              "version": "21df0c2e7d195de4a3c650de9361b3037fa6c59a",
              "versionType": "git"
            },
            {
              "lessThan": "cde7b90e0539a3b11da377e463dfd2288a162dbf",
              "status": "affected",
              "version": "1d6d43d4805da9b3fa0f5841e8b1083c89868f35",
              "versionType": "git"
            },
            {
              "lessThan": "a641240b7e071c5538dc0e7894ece833fce459dd",
              "status": "affected",
              "version": "1d482e666b8e74c7555dbdfbfb77205eeed3ff2d",
              "versionType": "git"
            },
            {
              "lessThan": "61ffe8b1ee084e5c82a4e4bbf9e7b68e0c06e464",
              "status": "affected",
              "version": "1d482e666b8e74c7555dbdfbfb77205eeed3ff2d",
              "versionType": "git"
            },
            {
              "lessThan": "eb8e27c8fa9397b4a7b181c48fa58157dbe9902e",
              "status": "affected",
              "version": "1d482e666b8e74c7555dbdfbfb77205eeed3ff2d",
              "versionType": "git"
            },
            {
              "lessThan": "1556ba034b95cfd4f75ea93c1a2679ae0444bba1",
              "status": "affected",
              "version": "1d482e666b8e74c7555dbdfbfb77205eeed3ff2d",
              "versionType": "git"
            },
            {
              "lessThan": "8d61f926d42045961e6b65191c09e3678d86a9cf",
              "status": "affected",
              "version": "1d482e666b8e74c7555dbdfbfb77205eeed3ff2d",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "5f155c4046200f067b1dc3140ea99ef56e4e0b74",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "a8e9111a8625dd11e70edd61f7a1ccd26c041442",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "76cc8e04f38c2bbfcba07f62864a011f142bd40c",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "net/netlink/af_netlink.c",
            "net/netlink/diag.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "5.13"
            },
            {
              "lessThan": "5.13",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.14.*",
              "status": "unaffected",
              "version": "4.14.322",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.19.*",
              "status": "unaffected",
              "version": "4.19.291",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.4.*",
              "status": "unaffected",
              "version": "5.4.251",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.10.*",
              "status": "unaffected",
              "version": "5.10.188",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.15.*",
              "status": "unaffected",
              "version": "5.15.121",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.*",
              "status": "unaffected",
              "version": "6.1.39",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.3.*",
              "status": "unaffected",
              "version": "6.3.13",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.4.*",
              "status": "unaffected",
              "version": "6.4.4",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.5",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "4.14.322",
                  "versionStartIncluding": "4.14.237",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "4.19.291",
                  "versionStartIncluding": "4.19.195",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.4.251",
                  "versionStartIncluding": "5.4.126",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.10.188",
                  "versionStartIncluding": "5.10.44",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.15.121",
                  "versionStartIncluding": "5.13",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.1.39",
                  "versionStartIncluding": "5.13",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.3.13",
                  "versionStartIncluding": "5.13",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.4.4",
                  "versionStartIncluding": "5.13",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.5",
                  "versionStartIncluding": "5.13",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "4.4.273",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "4.9.273",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionStartIncluding": "5.12.11",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetlink: fix potential deadlock in netlink_set_err()\n\nsyzbot reported a possible deadlock in netlink_set_err() [1]\n\nA similar issue was fixed in commit 1d482e666b8e (\"netlink: disable IRQs\nfor netlink_lock_table()\") in netlink_lock_table()\n\nThis patch adds IRQ safety to netlink_set_err() and __netlink_diag_dump()\nwhich were not covered by cited commit.\n\n[1]\n\nWARNING: possible irq lock inversion dependency detected\n6.4.0-rc6-syzkaller-00240-g4e9f0ec38852 #0 Not tainted\n\nsyz-executor.2/23011 just changed the state of lock:\nffffffff8e1a7a58 (nl_table_lock){.+.?}-{2:2}, at: netlink_set_err+0x2e/0x3a0 net/netlink/af_netlink.c:1612\nbut this lock was taken by another, SOFTIRQ-safe lock in the past:\n (\u0026local-\u003equeue_stop_reason_lock){..-.}-{2:2}\n\nand interrupts could create inverse lock ordering between them.\n\nother info that might help us debug this:\n Possible interrupt unsafe locking scenario:\n\n       CPU0                    CPU1\n       ----                    ----\n  lock(nl_table_lock);\n                               local_irq_disable();\n                               lock(\u0026local-\u003equeue_stop_reason_lock);\n                               lock(nl_table_lock);\n  \u003cInterrupt\u003e\n    lock(\u0026local-\u003equeue_stop_reason_lock);\n\n *** DEADLOCK ***"
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-22T13:23:59.055Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/c09e8e3f7fd432984bf5422302b093d2371dfc48"
        },
        {
          "url": "https://git.kernel.org/stable/c/4b9adb8d4a62ff7608d4a7d4eb42036a88f30980"
        },
        {
          "url": "https://git.kernel.org/stable/c/8f6652ed2ad98fe6d13b903483d9257762ab2ec6"
        },
        {
          "url": "https://git.kernel.org/stable/c/cde7b90e0539a3b11da377e463dfd2288a162dbf"
        },
        {
          "url": "https://git.kernel.org/stable/c/a641240b7e071c5538dc0e7894ece833fce459dd"
        },
        {
          "url": "https://git.kernel.org/stable/c/61ffe8b1ee084e5c82a4e4bbf9e7b68e0c06e464"
        },
        {
          "url": "https://git.kernel.org/stable/c/eb8e27c8fa9397b4a7b181c48fa58157dbe9902e"
        },
        {
          "url": "https://git.kernel.org/stable/c/1556ba034b95cfd4f75ea93c1a2679ae0444bba1"
        },
        {
          "url": "https://git.kernel.org/stable/c/8d61f926d42045961e6b65191c09e3678d86a9cf"
        }
      ],
      "title": "netlink: fix potential deadlock in netlink_set_err()",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2023-53731",
    "datePublished": "2025-10-22T13:23:59.055Z",
    "dateReserved": "2025-10-22T13:21:37.349Z",
    "dateUpdated": "2025-10-22T13:23:59.055Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2023-53731\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-10-22T14:15:48.423\",\"lastModified\":\"2025-10-22T21:12:48.953\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nnetlink: fix potential deadlock in netlink_set_err()\\n\\nsyzbot reported a possible deadlock in netlink_set_err() [1]\\n\\nA similar issue was fixed in commit 1d482e666b8e (\\\"netlink: disable IRQs\\nfor netlink_lock_table()\\\") in netlink_lock_table()\\n\\nThis patch adds IRQ safety to netlink_set_err() and __netlink_diag_dump()\\nwhich were not covered by cited commit.\\n\\n[1]\\n\\nWARNING: possible irq lock inversion dependency detected\\n6.4.0-rc6-syzkaller-00240-g4e9f0ec38852 #0 Not tainted\\n\\nsyz-executor.2/23011 just changed the state of lock:\\nffffffff8e1a7a58 (nl_table_lock){.+.?}-{2:2}, at: netlink_set_err+0x2e/0x3a0 net/netlink/af_netlink.c:1612\\nbut this lock was taken by another, SOFTIRQ-safe lock in the past:\\n (\u0026local-\u003equeue_stop_reason_lock){..-.}-{2:2}\\n\\nand interrupts could create inverse lock ordering between them.\\n\\nother info that might help us debug this:\\n Possible interrupt unsafe locking scenario:\\n\\n       CPU0                    CPU1\\n       ----                    ----\\n  lock(nl_table_lock);\\n                               local_irq_disable();\\n                               lock(\u0026local-\u003equeue_stop_reason_lock);\\n                               lock(nl_table_lock);\\n  \u003cInterrupt\u003e\\n    lock(\u0026local-\u003equeue_stop_reason_lock);\\n\\n *** DEADLOCK ***\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/1556ba034b95cfd4f75ea93c1a2679ae0444bba1\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/4b9adb8d4a62ff7608d4a7d4eb42036a88f30980\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/61ffe8b1ee084e5c82a4e4bbf9e7b68e0c06e464\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/8d61f926d42045961e6b65191c09e3678d86a9cf\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/8f6652ed2ad98fe6d13b903483d9257762ab2ec6\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/a641240b7e071c5538dc0e7894ece833fce459dd\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/c09e8e3f7fd432984bf5422302b093d2371dfc48\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/cde7b90e0539a3b11da377e463dfd2288a162dbf\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/eb8e27c8fa9397b4a7b181c48fa58157dbe9902e\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…