CVE-2026-23440 — Time-of-check Time-of-use (TOCTOU) Race Condition in Linux
Severity
4.7MEDIUM
No vectorEPSS
0.0%
top 93.71%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 3
Description
In the Linux kernel, the following vulnerability has been resolved:
net/mlx5e: Fix race condition during IPSec ESN update
In IPSec full offload mode, the device reports an ESN (Extended
Sequence Number) wrap event to the driver. The driver validates this
event by querying the IPSec ASO and checking that the esn_event_arm
field is 0x0, which indicates an event has occurred. After handling
the event, the driver must re-arm the context by setting esn_event_arm
back to 0x1.
A race condition exist…
Affected Packages3 packages
▶CVEListV5linux/linuxfef06678931ff67b158d337b581e5cf5ca40a3a3 — 3dffc083292e6872787bd7e34b957627622f9af4+5
🔴Vulnerability Details
2OSV▶
CVE-2026-23440: In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Fix race condition during IPSec ESN update In IPSec full offload mode,↗2026-04-03
GHSA▶
GHSA-255w-8g7g-qmg6: In the Linux kernel, the following vulnerability has been resolved:
net/mlx5e: Fix race condition during IPSec ESN update
In IPSec full offload mode↗2026-04-03