CVE-2026-23066

HIGH

Linux kernel - Buffer Overflow

Title source: llm
STIX 2.1

Description

In the Linux kernel, the following vulnerability has been resolved: rxrpc: Fix recvmsg() unconditional requeue If rxrpc_recvmsg() fails because MSG_DONTWAIT was specified but the call at the front of the recvmsg queue already has its mutex locked, it requeues the call - whether or not the call is already queued. The call may be on the queue because MSG_PEEK was also passed and so the call was not dequeued or because the I/O thread requeued it. The unconditional requeue may then corrupt the recvmsg queue, leading to things like UAFs or refcount underruns. Fix this by only requeuing the call if it isn't already on the queue - and moving it to the front if it is already queued. If we don't queue it, we have to put the ref we obtained by dequeuing it. Also, MSG_PEEK doesn't dequeue the call so shouldn't call rxrpc_notify_socket() for the call if we didn't use up all the data on the queue, so fix that also.

Scores

CVSS v3 7.8
EPSS 0.0002
EPSS Percentile 4.7%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-674
Status published
Products (13)
linux/Kernel 4.11.0 - 6.18.8linux
Linux/Linux < 4.11
Linux/Linux 4.11
Linux/Linux 540b1c48c37ac0ad66212004db21e1ff7e2d78be - 0464bf75590da75b8413c3e758c04647b4cdb3c6
Linux/Linux 540b1c48c37ac0ad66212004db21e1ff7e2d78be - 2c28769a51deb6022d7fbd499987e237a01dd63a
Linux/Linux 540b1c48c37ac0ad66212004db21e1ff7e2d78be - 930114425065f7ace6e0c0630fab4af75e059ea8
Linux/Linux 540b1c48c37ac0ad66212004db21e1ff7e2d78be - cf969bddd6e69c5777fa89dc88402204e72f312a
Linux/Linux 6.12.78 - 6.12.*
Linux/Linux 6.18.8 - 6.18.*
Linux/Linux 6.19
... and 3 more
Published Feb 04, 2026
Tracked Since Feb 18, 2026