CVE-2026-23169

Severity CVSS v4.0:
Pending analysis
Type:
CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Publication date:
14/02/2026
Last modified:
18/03/2026

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> mptcp: fix race in mptcp_pm_nl_flush_addrs_doit()<br /> <br /> syzbot and Eulgyu Kim reported crashes in mptcp_pm_nl_get_local_id()<br /> and/or mptcp_pm_nl_is_backup()<br /> <br /> Root cause is list_splice_init() in mptcp_pm_nl_flush_addrs_doit()<br /> which is not RCU ready.<br /> <br /> list_splice_init_rcu() can not be called here while holding pernet-&gt;lock<br /> spinlock.<br /> <br /> Many thanks to Eulgyu Kim for providing a repro and testing our patches.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.15.201 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 6.1.164 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.6.125 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.12.72 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.13 (including) 6.18.9 (excluding)
cpe:2.3:o:linux:linux_kernel:6.19:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc7:*:*:*:*:*:*