CVE-2026-43216
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
06/05/2026
Última modificación:
06/05/2026
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
net: Drop the lock in skb_may_tx_timestamp()<br />
<br />
skb_may_tx_timestamp() may acquire sock::sk_callback_lock. The lock must<br />
not be taken in IRQ context, only softirq is okay. A few drivers receive<br />
the timestamp via a dedicated interrupt and complete the TX timestamp<br />
from that handler. This will lead to a deadlock if the lock is already<br />
write-locked on the same CPU.<br />
<br />
Taking the lock can be avoided. The socket (pointed by the skb) will<br />
remain valid until the skb is released. The ->sk_socket and ->file<br />
member will be set to NULL once the user closes the socket which may<br />
happen before the timestamp arrives.<br />
If we happen to observe the pointer while the socket is closing but<br />
before the pointer is set to NULL then we may use it because both<br />
pointer (and the file&#39;s cred member) are RCU freed.<br />
<br />
Drop the lock. Use READ_ONCE() to obtain the individual pointer. Add a<br />
matching WRITE_ONCE() where the pointer are cleared.



