CVE-2026-23302
Data Race Vulnerability in Linux Kernel Networking Components
Publication date: 2026-03-25
Last updated on: 2026-04-27
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux_kernel | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel involves data races around the sk->sk_{data_ready,write_space} pointers. Specifically, the skmsg layer and possibly other layers modify these pointers while other CPUs might read them concurrently without proper synchronization.
The issue was addressed by adding READ_ONCE()/WRITE_ONCE() annotations to ensure atomic access to these pointers for UDP, TCP, and AF_UNIX protocols, preventing concurrent read/write conflicts.
How can this vulnerability impact me? :
This vulnerability can lead to data races in the kernel networking stack, which may cause unpredictable behavior such as data corruption, kernel crashes, or system instability due to concurrent unsynchronized access to critical pointers.