CVE-2026-23179

medium

Description

In the Linux kernel, the following vulnerability has been resolved: nvmet-tcp: fixup hang in nvmet_tcp_listen_data_ready() When the socket is closed while in TCP_LISTEN a callback is run to flush all outstanding packets, which in turns calls nvmet_tcp_listen_data_ready() with the sk_callback_lock held. So we need to check if we are in TCP_LISTEN before attempting to get the sk_callback_lock() to avoid a deadlock.

References

https://git.kernel.org/stable/c/6e0c7503a5803d568d56a9f9bca662cd94a14908

https://git.kernel.org/stable/c/2fa8961d3a6a1c2395d8d560ffed2c782681bade

https://git.kernel.org/stable/c/1c90f930e7b410dd2d75a2a19a85e19c64e98ad5

Details

Source: Mitre, NVD

Published: 2026-02-14

Updated: 2026-02-18

Risk Information

CVSS v2

Base Score: 4.6

Vector: CVSS2#AV:L/AC:L/Au:S/C:N/I:N/A:C

Severity: Medium

CVSS v3

Base Score: 5.5

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Severity: Medium

EPSS

EPSS: 0.00018