CVE-2023-52522

In the Linux kernel, the following vulnerability has been resolved: net: fix possible store tearing in neigh_periodic_work() While looking at a related syzbot report involving neigh_periodic_work(), I found that I forgot to add an annotation when deleting an RCU protected item from a list. Readers use rcu_deference(*np), we need to use either rcu_assign_pointer() or WRITE_ONCE() on writer side to prevent store tearing. I use rcu_assign_pointer() to have lockdep support, this was the choice made in neigh_flush_dev().
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.6:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.6:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.6:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.6:rc4:*:*:*:*:*:*

History

16 Sep 2025, 16:25

Type Values Removed Values Added
CWE NVD-CWE-noinfo
CPE cpe:2.3:o:linux:linux_kernel:6.6:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.6:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.6:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.6:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux linux Kernel
Linux
References () https://git.kernel.org/stable/c/147d89ee41434b97043c2dcb17a97dc151859baa - () https://git.kernel.org/stable/c/147d89ee41434b97043c2dcb17a97dc151859baa - Patch
References () https://git.kernel.org/stable/c/25563b581ba3a1f263a00e8c9a97f5e7363be6fd - () https://git.kernel.org/stable/c/25563b581ba3a1f263a00e8c9a97f5e7363be6fd - Patch
References () https://git.kernel.org/stable/c/2ea52a2fb8e87067e26bbab4efb8872639240eb0 - () https://git.kernel.org/stable/c/2ea52a2fb8e87067e26bbab4efb8872639240eb0 - Patch
References () https://git.kernel.org/stable/c/95eabb075a5902f4c0834ab1fb12dc35730c05af - () https://git.kernel.org/stable/c/95eabb075a5902f4c0834ab1fb12dc35730c05af - Patch
References () https://git.kernel.org/stable/c/a75152d233370362eebedb2643592e7c883cc9fc - () https://git.kernel.org/stable/c/a75152d233370362eebedb2643592e7c883cc9fc - Patch
References () https://git.kernel.org/stable/c/f82aac8162871e87027692b36af335a2375d4580 - () https://git.kernel.org/stable/c/f82aac8162871e87027692b36af335a2375d4580 - Patch

21 Nov 2024, 08:39

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/147d89ee41434b97043c2dcb17a97dc151859baa - () https://git.kernel.org/stable/c/147d89ee41434b97043c2dcb17a97dc151859baa -
References () https://git.kernel.org/stable/c/25563b581ba3a1f263a00e8c9a97f5e7363be6fd - () https://git.kernel.org/stable/c/25563b581ba3a1f263a00e8c9a97f5e7363be6fd -
References () https://git.kernel.org/stable/c/2ea52a2fb8e87067e26bbab4efb8872639240eb0 - () https://git.kernel.org/stable/c/2ea52a2fb8e87067e26bbab4efb8872639240eb0 -
References () https://git.kernel.org/stable/c/95eabb075a5902f4c0834ab1fb12dc35730c05af - () https://git.kernel.org/stable/c/95eabb075a5902f4c0834ab1fb12dc35730c05af -
References () https://git.kernel.org/stable/c/a75152d233370362eebedb2643592e7c883cc9fc - () https://git.kernel.org/stable/c/a75152d233370362eebedb2643592e7c883cc9fc -
References () https://git.kernel.org/stable/c/f82aac8162871e87027692b36af335a2375d4580 - () https://git.kernel.org/stable/c/f82aac8162871e87027692b36af335a2375d4580 -

06 Nov 2024, 20:35

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5

02 Mar 2024, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-03-02 22:15

Updated : 2025-09-16 16:25


NVD link : CVE-2023-52522

Mitre link : CVE-2023-52522

CVE.ORG link : CVE-2023-52522


JSON object : View

Products Affected

linux

  • linux_kernel