net: annotate data-races around sk->sk_{data_ready,write_space}
Summary
| CVE | CVE-2026-23302 |
|---|---|
| State | PUBLISHED |
| Assigner | Linux |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-03-25 11:16:25 UTC |
| Updated | 2026-04-18 09:16:17 UTC |
| Description | In the Linux kernel, the following vulnerability has been resolved: net: annotate data-races around sk->sk_{data_ready,write_space} skmsg (and probably other layers) are changing these pointers while other cpus might read them concurrently. Add corresponding READ_ONCE()/WRITE_ONCE() annotations for UDP, TCP and AF_UNIX. |
Risk And Classification
EPSS: 0.000230000 probability, percentile 0.062300000 (date 2026-04-18)
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | Linux | Linux | affected 604326b41a6fb9b4a78b6179335decee0365cd8c c494448bb522bbbb63096540eb2319101a0480ab git | Not specified |
| CNA | Linux | Linux | affected 604326b41a6fb9b4a78b6179335decee0365cd8c f17c1c4acbe2bd702abce73a847a04a196fab2c5 git | Not specified |
| CNA | Linux | Linux | affected 604326b41a6fb9b4a78b6179335decee0365cd8c 27fccdbcbbfc4651b6f66756e6fa3f52e051ec23 git | Not specified |
| CNA | Linux | Linux | affected 604326b41a6fb9b4a78b6179335decee0365cd8c 2ef2b20cf4e04ac8a6ba68493f8780776ff84300 git | Not specified |
| CNA | Linux | Linux | affected 4.20 | Not specified |
| CNA | Linux | Linux | unaffected 4.20 semver | Not specified |
| CNA | Linux | Linux | unaffected 6.12.82 6.12.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.18.17 6.18.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.19.7 6.19.* semver | Not specified |
| CNA | Linux | Linux | unaffected 7.0 * original_commit_for_fix | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| git.kernel.org/stable/c/c494448bb522bbbb63096540eb2319101a0480ab | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| git.kernel.org/stable/c/f17c1c4acbe2bd702abce73a847a04a196fab2c5 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| git.kernel.org/stable/c/2ef2b20cf4e04ac8a6ba68493f8780776ff84300 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| git.kernel.org/stable/c/27fccdbcbbfc4651b6f66756e6fa3f52e051ec23 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.