Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.

Linux Kernel: Data Loss Risk in espintcp_close() Function

CVE-2026-23239
Summary

A bug in the Linux kernel's espintcp_close() function could cause data loss due to a race condition between threads. This issue has been fixed, and users should update their kernel to the latest version to prevent data corruption.

Original title
In the Linux kernel, the following vulnerability has been resolved: espintcp: Fix race condition in espintcp_close() This issue was discovered during a code audit. After cancel_work_sync() is ca...
Original description
In the Linux kernel, the following vulnerability has been resolved:

espintcp: Fix race condition in espintcp_close()

This issue was discovered during a code audit.

After cancel_work_sync() is called from espintcp_close(),
espintcp_tx_work() can still be scheduled from paths such as
the Delayed ACK handler or ksoftirqd.
As a result, the espintcp_tx_work() worker may dereference a
freed espintcp ctx or sk.

The following is a simple race scenario:

cpu0 cpu1

espintcp_close()
cancel_work_sync(&ctx->work);
espintcp_write_space()
schedule_work(&ctx->work);

To prevent this race condition, cancel_work_sync() is
replaced with disable_work_sync().
Published: 10 Mar 2026 · Updated: 13 Mar 2026 · First seen: 11 Mar 2026