Time-of-check Time-of-use (TOCTOU) Race Condition in Linux kernel - CVE-2026-31700

 

Time-of-check Time-of-use (TOCTOU) Race Condition in Linux kernel - CVE-2026-31700

Published: May 2, 2026


Vulnerability identifier: #VU129001
CSH Severity: Low
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2026-31700
CWE-ID: CWE-367
Exploitation vector: Local access
Exploit availability: No public exploit available
Vulnerable software:
Linux kernel
Software vendor:
Linux Foundation

Description

The vulnerability allows a local user to bypass safety checks.

The vulnerability exists due to a time-of-check time-of-use race condition in tpacket_snd() when processing a mmap'd vnet_hdr in the TPACKET TX path with PACKET_VNET_HDR enabled. A local user can modify vnet_hdr fields in the shared ring buffer between validation and use to bypass safety checks.

Only the TPACKET TX path is affected.


Remediation

Install security update from vendor's repository.

External links