Description
In the Linux kernel, the following vulnerability has been resolved: net: Fix TOCTOU issue in sk_is_readable() sk->sk_prot->sock_is_readable is a valid function pointer when sk resides in a sockmap. After the last sk_psock_put() (which usually happens when socket is removed from sockmap), sk->sk_prot gets restored and sk->sk_prot->sock_is_readable becomes NULL. This makes sk_is_readable() racy, if the value of sk->sk_prot is reloaded after the initial check. Which in turn may lead to a null pointer dereference. Ensure the function pointer does not turn NULL after the check.
References (9)
Scores
CVSS v3
4.7
EPSS
0.0009
EPSS Percentile
25.6%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
Details
CWE
CWE-367
Status
published
Products (9)
debian/debian_linux
11.0
linux/Kernel
4.17.0 - 5.10.239linux
linux/Kernel
5.11.0 - 5.15.186linux
linux/Kernel
5.16.0 - 6.1.142linux
linux/Kernel
6.13.0 - 6.15.3linux
linux/Kernel
6.2.0 - 6.6.94linux
linux/Kernel
6.7.0 - 6.12.34linux
linux/linux_kernel
6.16 rc1
linux/linux_kernel
4.17 - 5.10.239
Published
Jul 03, 2025
Tracked Since
Feb 18, 2026