Join the Cyber Forum: Threat Intel on May 12, 2026 to learn how AI is reshaping threat defense.Join the Virtual Cyber Forum: Threat IntelRegister Now
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-23120

CVE-2026-23120: Linux Kernel Race Condition Vulnerability

CVE-2026-23120 is a race condition flaw in the Linux kernel's l2tp module that causes data-race issues during tunnel deletion. This post explains its technical details, affected versions, impact, and mitigation steps.

Published: February 20, 2026

CVE-2026-23120 Overview

A data race vulnerability has been discovered in the Linux kernel's L2TP (Layer 2 Tunneling Protocol) implementation. The vulnerability exists in the l2tp_tunnel_del_work() function where concurrent access to sk->sk_socket can occur between the tunnel deletion worker thread and the socket release path, potentially leading to undefined behavior or system instability.

Critical Impact

This data race condition in the Linux kernel's L2TP subsystem can result in unpredictable system behavior when the socket pointer is accessed concurrently during tunnel deletion, potentially causing kernel crashes or data corruption.

Affected Products

  • Linux Kernel (versions with L2TP tunnel support)
  • Systems utilizing L2TP VPN tunneling
  • Linux-based network appliances with L2TP enabled

Discovery Timeline

  • 2026-02-14 - CVE CVE-2026-23120 published to NVD
  • 2026-02-18 - Last updated in NVD database

Technical Details for CVE-2026-23120

Vulnerability Analysis

The vulnerability was identified by syzbot, the automated kernel fuzzing system, which detected a KCSAN (Kernel Concurrency Sanitizer) data race between two concurrent operations: l2tp_tunnel_del_work and sk_common_release. The race occurs when one task writes to the socket pointer at memory location 0xffff88811c182b20 while another task simultaneously reads from the same location.

The write operation occurs through the socket release path (sk_common_release → sock_orphan → sk_set_socket), which sets the socket pointer to NULL. Concurrently, the L2TP tunnel deletion worker (l2tp_tunnel_del_work) reads this same pointer without proper synchronization, leading to a potential use-after-free or NULL pointer dereference scenario.

Root Cause

The root cause is improper synchronization when accessing sk->sk_socket in the l2tp_tunnel_del_work() function. The code path reads the socket pointer without distinguishing between kernel sockets and userspace sockets. When dealing with userspace sockets, the socket can be released and orphaned by another task while the L2TP tunnel deletion worker is still running, creating a race window.

The fix ensures that sk->sk_socket is only read when dealing with kernel sockets, which have different lifecycle management and don't experience the same concurrent release pattern. This eliminates the race condition by avoiding the problematic read entirely for userspace socket scenarios.

Attack Vector

This vulnerability is triggered through a race condition between two kernel execution paths:

  1. Socket Release Path: When a userspace application closes an L2TP socket, the sock_close() → inet_release() → udp_lib_close() → sk_common_release() chain executes, which calls sock_orphan() to disassociate the socket from its file descriptor and sets the socket pointer to NULL.

  2. Tunnel Deletion Worker: Concurrently, the l2tp_tunnel_del_work() function runs as a scheduled work item and attempts to read sk->sk_socket without proper checks.

The data race manifests when these two paths execute simultaneously on different CPUs, with the value changing from a valid pointer (0xffff88811b818000) to NULL (0x0000000000000000) during the read operation, potentially leading to kernel crashes or memory corruption.

Detection Methods for CVE-2026-23120

Indicators of Compromise

  • Kernel crash logs indicating NULL pointer dereference in l2tp_tunnel_del_work
  • KCSAN warnings in kernel logs showing data-race between l2tp_tunnel_del_work and sk_common_release
  • Unexpected system reboots or kernel panics when L2TP tunnels are being torn down
  • Stack traces referencing net/l2tp/l2tp_core.c at line 1418

Detection Strategies

  • Enable KCSAN (Kernel Concurrency Sanitizer) in development/testing kernels to detect data races proactively
  • Monitor kernel logs for warnings containing "KCSAN: data-race in l2tp_tunnel_del_work"
  • Deploy kernel debugging tools to trace L2TP tunnel lifecycle operations
  • Review system crash dumps for evidence of race conditions in the L2TP subsystem

Monitoring Recommendations

  • Configure syslog alerts for kernel KCSAN warnings and L2TP-related kernel messages
  • Monitor system stability during L2TP tunnel setup/teardown operations
  • Track kernel oops and panic events correlating with L2TP tunnel activity
  • Implement automated kernel log analysis for race condition detection patterns

How to Mitigate CVE-2026-23120

Immediate Actions Required

  • Update affected Linux kernel installations to patched versions that include the fix
  • Review L2TP configuration and consider temporarily disabling L2TP tunneling if updates cannot be immediately applied
  • Monitor systems for signs of kernel instability related to L2TP operations
  • Prioritize patching on systems actively using L2TP VPN tunneling

Patch Information

Multiple patch commits have been released to address this vulnerability across different kernel branches:

CommitReference
1f63ca44b4f4Linux Kernel Commit 1f63ca44
32d417497b79Linux Kernel Commit 32d41749
36c40a80109fLinux Kernel Commit 36c40a80
3d6d414b214cLinux Kernel Commit 3d6d414b
68e92085427cLinux Kernel Commit 68e92085
7a29f6bf60f2Linux Kernel Commit 7a29f6bf
eae074dab764Linux Kernel Commit eae074da

The patch modifies l2tp_tunnel_del_work() to only access sk->sk_socket when dealing with kernel sockets, eliminating the race condition with userspace socket release operations.

Workarounds

  • Limit L2TP tunnel usage to essential operations until patches are applied
  • Consider using alternative tunneling protocols (IPsec, WireGuard) where feasible as a temporary measure
  • Implement additional monitoring on L2TP-enabled systems to detect potential instability
  • Reduce concurrent L2TP tunnel creation/deletion operations where possible to minimize race condition exposure
bash
# Check current kernel version for affected L2TP code
uname -r

# Verify L2TP module is loaded
lsmod | grep l2tp

# Monitor kernel logs for race condition warnings
dmesg | grep -i "kcsan\|l2tp\|data-race"

# If L2TP is not required, consider unloading the module temporarily
sudo modprobe -r l2tp_ppp l2tp_netlink l2tp_core

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeRace Condition

  • Vendor/TechLinux Kernel

  • SeverityNONE

  • CVSS ScoreN/A

  • EPSS Probability0.02%

  • Known ExploitedNo
  • Impact Assessment
  • ConfidentialityNone
  • IntegrityNone
  • AvailabilityNone
  • Technical References
  • Linux Kernel Commit 1f63ca44

  • Linux Kernel Commit 32d41749

  • Linux Kernel Commit 36c40a80

  • Linux Kernel Commit 3d6d414b

  • Linux Kernel Commit 68e92085

  • Linux Kernel Commit 7a29f6bf

  • Linux Kernel Commit eae074da
  • Related CVEs
  • CVE-2026-31456: Linux Kernel Race Condition Vulnerability

  • CVE-2026-31466: Linux Kernel Race Condition Vulnerability

  • CVE-2026-31455: Linux Kernel Race Condition Vulnerability

  • CVE-2026-31436: Linux Kernel Race Condition Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English