CVE-2026-23302
Received Received - Intake
Data Race Vulnerability in Linux Kernel Networking Components

Publication date: 2026-03-25

Last updated on: 2026-04-27

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: net: annotate data-races around sk->sk_{data_ready,write_space} skmsg (and probably other layers) are changing these pointers while other cpus might read them concurrently. Add corresponding READ_ONCE()/WRITE_ONCE() annotations for UDP, TCP and AF_UNIX.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-25
Last Modified
2026-04-27
Generated
2026-05-07
AI Q&A
2026-03-25
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
linux_kernel linux_kernel *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in the Linux kernel involves data races around the sk->sk_{data_ready,write_space} pointers. Specifically, the skmsg layer and possibly other layers modify these pointers while other CPUs might read them concurrently without proper synchronization.

The issue was addressed by adding READ_ONCE()/WRITE_ONCE() annotations to ensure atomic access to these pointers for UDP, TCP, and AF_UNIX protocols, preventing concurrent read/write conflicts.


How can this vulnerability impact me? :

This vulnerability can lead to data races in the kernel networking stack, which may cause unpredictable behavior such as data corruption, kernel crashes, or system instability due to concurrent unsynchronized access to critical pointers.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart