CVE-2026-23239

Source
https://cve.org/CVERecord?id=CVE-2026-23239
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23239.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-23239
Downstream
Related
Published
2026-03-10T17:28:26.190Z
Modified
2026-03-19T08:59:07.281536Z
Summary
espintcp: Fix race condition in espintcp_close()
Details

In the Linux kernel, the following vulnerability has been resolved:

espintcp: Fix race condition in espintcp_close()

This issue was discovered during a code audit.

After cancelworksync() is called from espintcpclose(), espintcptxwork() can still be scheduled from paths such as the Delayed ACK handler or ksoftirqd. As a result, the espintcptx_work() worker may dereference a freed espintcp ctx or sk.

The following is a simple race scenario:

       cpu0                             cpu1

espintcpclose() cancelworksync(&ctx->work); espintcpwritespace() schedulework(&ctx->work);

To prevent this race condition, cancelworksync() is replaced with disableworksync().

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23239.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
e27cca96cd68fa2c6814c90f9a1cfd36bb68c593
Fixed
f7ad8b1d0e421c524604d5076b73232093490d5c
Fixed
664e9df53226b4505a0894817ecad2c610ab11d8
Fixed
022ff7f347588de6e17879a1da6019647b21321b
Fixed
e1512c1db9e8794d8d130addd2615ec27231d994

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23239.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.6.0
Fixed
6.12.75
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.18.16
Type
ECOSYSTEM
Events
Introduced
6.19.0
Fixed
6.19.6

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23239.json"