CVE-2026-23331

Source
https://cve.org/CVERecord?id=CVE-2026-23331
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23331.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-23331
Downstream
Published
2026-03-25T10:27:22.526Z
Modified
2026-04-02T13:12:21.601957Z
Summary
udp: Unhash auto-bound connected sk from 4-tuple hash table when disconnected.
Details

In the Linux kernel, the following vulnerability has been resolved:

udp: Unhash auto-bound connected sk from 4-tuple hash table when disconnected.

Let's say we bind() an UDP socket to the wildcard address with a non-zero port, connect() it to an address, and disconnect it from the address.

bind() sets SOCKBINDPORTLOCK on sk->skuserlocks (but not SOCKBINDADDRLOCK), and connect() calls udplib_hash4() to put the socket into the 4-tuple hash table.

Then, __udpdisconnect() calls sk->skprot->rehash(sk).

It computes a new hash based on the wildcard address and moves the socket to a new slot in the 4-tuple hash table, leaving a garbage in the chain that no packet hits.

Let's remove such a socket from 4-tuple hash table when disconnected.

Note that udpsk(sk)->udpportaddrhash needs to be udpated after udphash4dec(hslot2) in udpunhash4().

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23331.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
78c91ae2c6deb5d236a5a93ff2995cdd05514380
Fixed
b955350778b8715e1b7885179979b3a68221c0fb
Fixed
3b8f104880c104151f8c30f2f89df81fb59a286c
Fixed
6996a2d2d0a64808c19c98002aeb5d9d1b2df6a4

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23331.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.18.17
Type
ECOSYSTEM
Events
Introduced
6.19.0
Fixed
6.19.7

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23331.json"