Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-23103— ipvlan: Make the addrs_lock be per port

CVSS 7.8 · High EPSS 0.01% · P3

Affected Version Matrix 16

VendorProductVersion RangeStatus
LinuxLinux8230819494b3bf284ca7262ac5f877333147b937< 3c149b662cbb202a450e81f938e702ba333864adaffected
8230819494b3bf284ca7262ac5f877333147b937< 70feb16e3fbfb10b15de1396557c38e99f1ab8dfaffected
8230819494b3bf284ca7262ac5f877333147b937< 88f83e6c9cdb46b8c8ddd0ba01393362963cf589affected
8230819494b3bf284ca7262ac5f877333147b937< 04ba6de6eff61238e5397c14ac26a6578c7735a5affected
8230819494b3bf284ca7262ac5f877333147b937< 1f300c10d92c547c3a7d978e1212ff52f18256edaffected
8230819494b3bf284ca7262ac5f877333147b937< 6a81e2db096913d7e43aada1c350c1282e76db39affected
8230819494b3bf284ca7262ac5f877333147b937< d3ba32162488283c0a4c5bedd8817aec91748802affected
4.17affected
… +8 more rows
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-23103

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
ipvlan: Make the addrs_lock be per port
Source: NVD (National Vulnerability Database)
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: ipvlan: Make the addrs_lock be per port Make the addrs_lock be per port, not per ipvlan dev. Initial code seems to be written in the assumption, that any address change must occur under RTNL. But it is not so for the case of IPv6. So 1) Introduce per-port addrs_lock. 2) It was needed to fix places where it was forgotten to take lock (ipvlan_open/ipvlan_close) This appears to be a very minor problem though. Since it's highly unlikely that ipvlan_add_addr() will be called on 2 CPU simultaneously. But nevertheless, this could cause: 1) False-negative of ipvlan_addr_busy(): one interface iterated through all port->ipvlans + ipvlan->addrs under some ipvlan spinlock, and another added IP under its own lock. Though this is only possible for IPv6, since looks like only ipvlan_addr6_event() can be called without rtnl_lock. 2) Race since ipvlan_ht_addr_add(port) is called under different ipvlan->addrs_lock locks This should not affect performance, since add/remove IP is a rare situation and spinlock is not taken on fast paths.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于IPvlan地址锁未按端口分配,可能导致地址管理出现竞争条件。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
LinuxLinux 8230819494b3bf284ca7262ac5f877333147b937 ~ 3c149b662cbb202a450e81f938e702ba333864ad -
LinuxLinux 4.17 -

II. Public POCs for CVE-2026-23103

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-23103

登录查看更多情报信息。

Same Patch Batch · Linux · 2026-02-04 · 79 CVEs total

CVE-2026-230988.8 HIGHnetrom: fix double-free in nr_route_frame()
CVE-2026-230777.8 HIGHmm/vma: fix anon_vma UAF on mremap() faulted, unfaulted merge
CVE-2026-230747.8 HIGHnet/sched: Enforce that teql can only be used as root qdisc
CVE-2026-231057.8 HIGHnet/sched: qfq: Use cl_is_active to determine whether class is active in qfq_rm_from_ag
CVE-2026-230667.8 HIGHrxrpc: Fix recvmsg() unconditional requeue
CVE-2026-230957.5 HIGHgue: Fix skb memleak with inner IP protocol 0.
CVE-2026-23067iommu/io-pgtable-arm: fix size_t signedness bug in unmap path
CVE-2026-23065platform/x86/amd: Fix memory leak in wbrf_record()
CVE-2026-23062platform/x86: hp-bioscfg: Fix kernel panic in GET_INSTANCE_ID macro
CVE-2026-23063uacce: ensure safe queue release with state management
CVE-2026-23061can: kvaser_usb: kvaser_usb_read_bulk_callback(): fix URB memory leak
CVE-2026-23058can: ems_usb: ems_usb_read_bulk_callback(): fix URB memory leak
CVE-2026-23057vsock/virtio: Coalesce only linear skb
CVE-2026-23056uacce: implement mremap in uacce_vm_ops to return -EPERM
CVE-2025-71199iio: adc: at91-sama5d2_adc: Fix potential use-after-free in sama5d2_adc driver
CVE-2025-71198iio: imu: st_lsm6dsx: fix iio_chan_spec for sensors without event detection
CVE-2025-71197w1: therm: Fix off-by-one buffer overflow in alarms_store
CVE-2026-23055i2c: riic: Move suspend handling to NOIRQ phase
CVE-2026-23064net/sched: act_ife: avoid possible NULL deref
CVE-2026-23053NFS: Fix a deadlock involving nfs_release_folio()

Showing top 20 of 79 CVEs. View all on vendor page &rarr; →

IV. Related Vulnerabilities

V. Comments for CVE-2026-23103

No comments yet


Leave a comment