CVE-2026-23120
Data Race Vulnerability in Linux Kernel L2TP Socket Handling
Publication date: 2026-02-14
Last updated on: 2026-03-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 4.16 |
| linux | linux_kernel | 4.16 |
| linux | linux_kernel | 4.16 |
| linux | linux_kernel | From 3.16.57 (inc) to 3.17 (exc) |
| linux | linux_kernel | 4.16 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | From 5.11 (inc) to 5.15.199 (exc) |
| linux | linux_kernel | From 5.16 (inc) to 6.1.162 (exc) |
| linux | linux_kernel | From 6.2 (inc) to 6.6.122 (exc) |
| linux | linux_kernel | From 6.7 (inc) to 6.12.68 (exc) |
| linux | linux_kernel | From 6.13 (inc) to 6.18.8 (exc) |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | From 4.15.8 (inc) to 4.16 (exc) |
| linux | linux_kernel | From 4.16.1 (inc) to 5.10.249 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a data-race condition in the Linux kernel's L2TP (Layer 2 Tunneling Protocol) implementation, specifically in the function l2tp_tunnel_del_work().
A data-race occurs when two or more tasks access the same memory location concurrently, and at least one of the accesses is a write. In this case, the race happens when reading and writing to sk->sk_socket, which should only be accessed when dealing with kernel sockets.
The issue was reported by syzbot and involves concurrent access to socket structures leading to potential instability or crashes in the kernel.
How can this vulnerability impact me? :
This data-race vulnerability can lead to kernel instability, including crashes or unexpected behavior when handling L2TP tunnels.
Such instability can cause denial of service conditions, affecting the availability of network services relying on L2TP.
Because it involves kernel socket handling, it may also impact the reliability and security of network communications on affected systems.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
I don't know