VYPR
Unrated severityNVD Advisory· Published Feb 14, 2026· Updated Apr 15, 2026

CVE-2026-23179

CVE-2026-23179

Description

In the Linux kernel, the following vulnerability has been resolved:

nvmet-tcp: fixup hang in nvmet_tcp_listen_data_ready()

When the socket is closed while in TCP_LISTEN a callback is run to flush all outstanding packets, which in turns calls nvmet_tcp_listen_data_ready() with the sk_callback_lock held. So we need to check if we are in TCP_LISTEN before attempting to get the sk_callback_lock() to avoid a deadlock.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A deadlock in the Linux kernel's NVMe-over-TCP target (nvmet-tcp) can occur when a socket is closed while in TCP_LISTEN, leading to system hang.

Vulnerability

Overview

In the Linux kernel's NVMe-over-TCP target (nvmet-tcp), a deadlock can occur in the nvmet_tcp_listen_data_ready() function. The root cause is that when a socket is closed while in the TCP_LISTEN state, a callback is invoked to flush outstanding packets, which calls nvmet_tcp_listen_data_ready() with the sk_callback_lock already held. If the function then tries to acquire the same lock, a deadlock results.

Exploitation

The vulnerability is triggered during socket closure on a listening socket within the nvmet-tcp subsystem. An attacker with the ability to influence networking operations—such as sending a FIN or RST to a listening port—could induce the deadlock. No special privileges are required beyond network access to the target's listening port. The attack surface is limited to systems running the nvmet-tcp module, typically used in storage area networks.

Impact

Successful exploitation causes a kernel deadlock, rendering the system unresponsive. This constitutes a denial-of-service (DoS) condition. The hang prevents the system from processing further network or I/O operations until a reboot. There is no evidence of data corruption or privilege escalation.

Mitigation

The fix was introduced in Linux kernel stable commits [1][2] that add a check for the TCP_LISTEN state before attempting to acquire the lock. Users should apply the latest stable updates. No workaround exists other than disabling the nvmet-tcp module if not needed.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.