CVE-2026-23331

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
25/03/2026
Last modified:
23/04/2026

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> udp: Unhash auto-bound connected sk from 4-tuple hash table when disconnected.<br /> <br /> Let&amp;#39;s say we bind() an UDP socket to the wildcard address with a<br /> non-zero port, connect() it to an address, and disconnect it from<br /> the address.<br /> <br /> bind() sets SOCK_BINDPORT_LOCK on sk-&gt;sk_userlocks (but not<br /> SOCK_BINDADDR_LOCK), and connect() calls udp_lib_hash4() to put<br /> the socket into the 4-tuple hash table.<br /> <br /> Then, __udp_disconnect() calls sk-&gt;sk_prot-&gt;rehash(sk).<br /> <br /> It computes a new hash based on the wildcard address and moves<br /> the socket to a new slot in the 4-tuple hash table, leaving a<br /> garbage in the chain that no packet hits.<br /> <br /> Let&amp;#39;s remove such a socket from 4-tuple hash table when disconnected.<br /> <br /> Note that udp_sk(sk)-&gt;udp_portaddr_hash needs to be udpated after<br /> udp_hash4_dec(hslot2) in udp_unhash4().

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.13.1 (including) 6.18.17 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.19 (including) 6.19.7 (excluding)
cpe:2.3:o:linux:linux_kernel:6.13:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:*