CVE-2026-23255
RCU Violation in Linux Kernel net/proc_net/ptype Causes Data Race
Publication date: 2026-03-18
Last updated on: 2026-04-27
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's network code related to the /proc/net/ptype interface. The issue is that certain functions, specifically ptype_seq_next() and ptype_seq_show(), violate Read-Copy-Update (RCU) rules. The ptype_seq_show() function reads a device pointer (pt->dev) under an RCU read lock without proper synchronization barriers, while concurrent writers can remove and modify the packet_type structure and its device pointer without respecting RCU grace periods. This can lead to unsafe concurrent access and potential data races.
The fix involves adding proper RCU protection by recording the device pointer safely during iteration and adding missing synchronization primitives like READ_ONCE() when accessing linked list pointers. This ensures that ptype_seq_show() is safe against concurrent changes to the device pointer.
How can this vulnerability impact me? :
This vulnerability can lead to unsafe concurrent access to kernel data structures, potentially causing kernel crashes, data corruption, or undefined behavior. Since it involves improper synchronization in the kernel's network subsystem, exploitation could destabilize the system or lead to denial of service conditions.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
I don't know