CVE-2026-23419

Source
https://cve.org/CVERecord?id=CVE-2026-23419
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-23419.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2026-23419
Downstream
Related
Published
2026-04-03T13:24:23.958Z
Modified
2026-05-07T04:17:52.606617Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
net/rds: Fix circular locking dependency in rds_tcp_tune
Details

In the Linux kernel, the following vulnerability has been resolved:

net/rds: Fix circular locking dependency in rdstcptune

syzbot reported a circular locking dependency in rdstcptune() where sknetrefcnt_upgrade() is called while holding the socket lock:

======================================================

WARNING: possible circular locking dependency detected

kworker/u10:8/15040 is trying to acquire lock: ffffffff8e9aaf80 (fs_reclaim){+.+.}-{0:0}, at: __kmalloccachenoprof+0x4b/0x6f0

but task is already holding lock: ffff88805a3c1ce0 (k-sklock-AFINET6){+.+.}-{0:0}, at: rdstcptune+0xd7/0x930

The issue occurs because sknetrefcntupgrade() performs memory allocation (via getnettrack() -> reftrackeralloc()) while the socket lock is held, creating a circular dependency with fsreclaim.

Fix this by moving sknetrefcntupgrade() outside the socket lock critical section. This is safe because the fields modified by the sknetrefcntupgrade() call (sknetrefcnt, ns_tracker) are not accessed by any concurrent code path at this point.

v2: - Corrected fixes tag - check patch line wrap nits - ai commentary nits

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23419.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
3a58f13a881ed351198ffab4cf9953cf19d2ab3a
Fixed
8babb271403378ba6836f6c8599c5313d0e2355d
Fixed
8519e6883a942e510f33a0e634e27bcc3a844a40
Fixed
6ce948fa54599f369ff7fe8b793a6aae4b0762b2
Fixed
026bbaeeab9e04534ee58882b6447300629b42f6
Fixed
6a877ececd6daa002a9a0002cd0fbca6592a9244
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
2a6efabed754c9dcf27e6def71317b374f58a852

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-23419.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.18.0
Fixed
6.6.130
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.12.77
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.18.17
Type
ECOSYSTEM
Events
Introduced
6.19.0
Fixed
6.19.7

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-23419.json"