CVE-2026-23066

Source
https://cve.org/CVERecord?id=CVE-2026-23066
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-23066.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2026-23066
Downstream
Related
Published
2026-02-04T16:07:47.764Z
Modified
2026-04-04T03:02:20.224109Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
rxrpc: Fix recvmsg() unconditional requeue
Details

In the Linux kernel, the following vulnerability has been resolved:

rxrpc: Fix recvmsg() unconditional requeue

If rxrpcrecvmsg() fails because MSGDONTWAIT was specified but the call at the front of the recvmsg queue already has its mutex locked, it requeues the call - whether or not the call is already queued. The call may be on the queue because MSG_PEEK was also passed and so the call was not dequeued or because the I/O thread requeued it.

The unconditional requeue may then corrupt the recvmsg queue, leading to things like UAFs or refcount underruns.

Fix this by only requeuing the call if it isn't already on the queue - and moving it to the front if it is already queued. If we don't queue it, we have to put the ref we obtained by dequeuing it.

Also, MSGPEEK doesn't dequeue the call so shouldn't call rxrpcnotify_socket() for the call if we didn't use up all the data on the queue, so fix that also.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23066.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
540b1c48c37ac0ad66212004db21e1ff7e2d78be
Fixed
0464bf75590da75b8413c3e758c04647b4cdb3c6
Fixed
cf969bddd6e69c5777fa89dc88402204e72f312a
Fixed
930114425065f7ace6e0c0630fab4af75e059ea8
Fixed
2c28769a51deb6022d7fbd499987e237a01dd63a

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-23066.json"