Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.

Linux Kernel: TLS Data Corrupted Due to Race Condition

CVE-2026-23240
Summary

A security issue has been fixed in the Linux kernel that could cause corruption of TLS data. This issue was found during a code review and affects how the system handles network connections. To fix the issue, the kernel developers have updated the code to prevent a race condition that could lead to data corruption.

Original title
In the Linux kernel, the following vulnerability has been resolved: tls: Fix race condition in tls_sw_cancel_work_tx() This issue was discovered during a code audit. After cancel_delayed_work_sy...
Original description
In the Linux kernel, the following vulnerability has been resolved:

tls: Fix race condition in tls_sw_cancel_work_tx()

This issue was discovered during a code audit.

After cancel_delayed_work_sync() is called from tls_sk_proto_close(),
tx_work_handler() can still be scheduled from paths such as the
Delayed ACK handler or ksoftirqd.
As a result, the tx_work_handler() worker may dereference a freed
TLS object.

The following is a simple race scenario:

cpu0 cpu1

tls_sk_proto_close()
tls_sw_cancel_work_tx()
tls_write_space()
tls_sw_write_space()
if (!test_and_set_bit(BIT_TX_SCHEDULED, &tx_ctx->tx_bitmask))
set_bit(BIT_TX_SCHEDULED, &ctx->tx_bitmask);
cancel_delayed_work_sync(&ctx->tx_work.work);
schedule_delayed_work(&tx_ctx->tx_work.work, 0);

To prevent this race condition, cancel_delayed_work_sync() is
replaced with disable_delayed_work_sync().
Published: 10 Mar 2026 · Updated: 13 Mar 2026 · First seen: 11 Mar 2026