CVE-2026-23103Improper Locking in Linux

Severity
5.5MEDIUMNVD
CNA7.8
EPSS
0.0%
top 97.52%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedFeb 4
Latest updateApr 16

Description

In the Linux kernel, the following vulnerability has been resolved: ipvlan: Make the addrs_lock be per port Make the addrs_lock be per port, not per ipvlan dev. Initial code seems to be written in the assumption, that any address change must occur under RTNL. But it is not so for the case of IPv6. So 1) Introduce per-port addrs_lock. 2) It was needed to fix places where it was forgotten to take lock (ipvlan_open/ipvlan_close) This appears to be a very minor problem though. Since it's highl

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages3 packages

NVDlinux/linux_kernel4.175.10.249+6
Debianlinux/linux_kernel< 5.10.249-1+3
CVEListV5linux/linux8230819494b3bf284ca7262ac5f877333147b9373c149b662cbb202a450e81f938e702ba333864ad+7

Patches

🔴Vulnerability Details

3
CVEList
ipvlan: Make the addrs_lock be per port2026-02-04
GHSA
GHSA-ghmm-m363-9645: In the Linux kernel, the following vulnerability has been resolved: ipvlan: Make the addrs_lock be per port Make the addrs_lock be per port, not per2026-02-04
OSV
CVE-2026-23103: In the Linux kernel, the following vulnerability has been resolved: ipvlan: Make the addrs_lock be per port Make the addrs_lock be per port, not per i2026-02-04

📋Vendor Advisories

4
Ubuntu
Linux kernel vulnerabilities2026-04-16
Ubuntu
Linux kernel (NVIDIA Tegra) vulnerabilities2026-04-09
Red Hat
kernel: ipvlan: Make the addrs_lock be per port2026-02-04
Debian
CVE-2026-23103: linux - In the Linux kernel, the following vulnerability has been resolved: ipvlan: Mak...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-23103 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-23103 — Improper Locking in Linux | cvebase