CVE-2026-23331
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
25/03/2026
Last modified:
23/04/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
udp: Unhash auto-bound connected sk from 4-tuple hash table when disconnected.<br />
<br />
Let&#39;s say we bind() an UDP socket to the wildcard address with a<br />
non-zero port, connect() it to an address, and disconnect it from<br />
the address.<br />
<br />
bind() sets SOCK_BINDPORT_LOCK on sk->sk_userlocks (but not<br />
SOCK_BINDADDR_LOCK), and connect() calls udp_lib_hash4() to put<br />
the socket into the 4-tuple hash table.<br />
<br />
Then, __udp_disconnect() calls sk->sk_prot->rehash(sk).<br />
<br />
It computes a new hash based on the wildcard address and moves<br />
the socket to a new slot in the 4-tuple hash table, leaving a<br />
garbage in the chain that no packet hits.<br />
<br />
Let&#39;s remove such a socket from 4-tuple hash table when disconnected.<br />
<br />
Note that udp_sk(sk)->udp_portaddr_hash needs to be udpated after<br />
udp_hash4_dec(hslot2) in udp_unhash4().
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13.1 (including) | 6.18.17 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.19 (including) | 6.19.7 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.13:-:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



