CVE-2026-23394 — Time-of-check Time-of-use (TOCTOU) Race Condition in Linux
Severity
5.5MEDIUM
No vectorEPSS
0.0%
top 94.14%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 25
Latest updateApr 20
Description
In the Linux kernel, the following vulnerability has been resolved:
af_unix: Give up GC if MSG_PEEK intervened.
Igor Ushakov reported that GC purged the receive queue of
an alive socket due to a race with MSG_PEEK with a nice repro.
This is the exact same issue previously fixed by commit
cbcf01128d0a ("af_unix: fix garbage collect vs MSG_PEEK").
After GC was replaced with the current algorithm, the cited
commit removed the locking dance in unix_peek_fds() and
reintroduced the same issue.
Th…
Affected Packages4 packages
▶CVEListV5linux/linux118f457da9ed58a79e24b73c2ef0aa1987241f0e — 37dd7ab332396eb8dd80b2dc7ea4b61abf767436+4
🔴Vulnerability Details
4VulDB▶
Linux Kernel up to 6.19.9/7.0-rc4 af_unix unix_peek_fds reference count (EUVD-2026-15396)↗2026-04-20
OSV▶
CVE-2026-23394: In the Linux kernel, the following vulnerability has been resolved: af_unix: Give up GC if MSG_PEEK intervened↗2026-03-25
GHSA▶
GHSA-p5pc-67g7-qcv2: In the Linux kernel, the following vulnerability has been resolved:
af_unix: Give up GC if MSG_PEEK intervened↗2026-03-25