-
CVE-2026-23179
- EPSS 0.02%
- Veröffentlicht 14.02.2026 16:27:10
- Zuletzt bearbeitet 18.02.2026 17:52:22
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
In the Linux kernel, the following vulnerability has been resolved: nvmet-tcp: fixup hang in nvmet_tcp_listen_data_ready() When the socket is closed while in TCP_LISTEN a callback is run to flush all outstanding packets, which in turns calls nvmet_tcp_listen_data_ready() with the sk_callback_lock held. So we need to check if we are in TCP_LISTEN before attempting to get the sk_callback_lock() to avoid a deadlock.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
6e0c7503a5803d568d56a9f9bca662cd94a14908
Version
675b453e024154dd547921c6e6d5b58747ba7e0e
Status
affected
Version <
1c90f930e7b410dd2d75a2a19a85e19c64e98ad5
Version
675b453e024154dd547921c6e6d5b58747ba7e0e
Status
affected
Version <
2fa8961d3a6a1c2395d8d560ffed2c782681bade
Version
675b453e024154dd547921c6e6d5b58747ba7e0e
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
6.7
Status
affected
Version <
6.7
Version
0
Status
unaffected
Version <=
6.12.*
Version
6.12.70
Status
unaffected
Version <=
6.18.*
Version
6.18.10
Status
unaffected
Version <=
*
Version
6.19
Status
unaffected
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.02% | 0.06 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|