-

CVE-2026-23240

In the Linux kernel, the following vulnerability has been resolved:

tls: Fix race condition in tls_sw_cancel_work_tx()

This issue was discovered during a code audit.

After cancel_delayed_work_sync() is called from tls_sk_proto_close(),
tx_work_handler() can still be scheduled from paths such as the
Delayed ACK handler or ksoftirqd.
As a result, the tx_work_handler() worker may dereference a freed
TLS object.

The following is a simple race scenario:

          cpu0                         cpu1

tls_sk_proto_close()
  tls_sw_cancel_work_tx()
                                 tls_write_space()
                                   tls_sw_write_space()
                                     if (!test_and_set_bit(BIT_TX_SCHEDULED, &tx_ctx->tx_bitmask))
    set_bit(BIT_TX_SCHEDULED, &ctx->tx_bitmask);
    cancel_delayed_work_sync(&ctx->tx_work.work);
                                     schedule_delayed_work(&tx_ctx->tx_work.work, 0);

To prevent this race condition, cancel_delayed_work_sync() is
replaced with disable_delayed_work_sync().
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < a5de36d6cee74a92c1a21b260bc507e64bc451de
Version f87e62d45e51b12d48d2cb46b5cde8f83b866bc4
Status affected
Version < 854cd32bc74fe573353095e90958490e4e4d641b
Version f87e62d45e51b12d48d2cb46b5cde8f83b866bc4
Status affected
Version < 17153f154f80be2b47ebf52840f2d8f724eb2f3b
Version f87e62d45e51b12d48d2cb46b5cde8f83b866bc4
Status affected
Version < 7bb09315f93dce6acc54bf59e5a95ba7365c2be4
Version f87e62d45e51b12d48d2cb46b5cde8f83b866bc4
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 5.3
Status affected
Version < 5.3
Version 0
Status unaffected
Version <= 6.12.*
Version 6.12.75
Status unaffected
Version <= 6.18.*
Version 6.18.16
Status unaffected
Version <= 6.19.*
Version 6.19.6
Status unaffected
Version <= *
Version 7.0-rc2
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.02% 0.059
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
Es wurden noch keine Informationen zu CWE veröffentlicht.