CVE-2026-23175 — Linux vulnerability
9 documents8 sources
Severity
7.0HIGHNVD
EPSS
0.0%
top 96.12%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedFeb 14
Latest updateApr 13
Description
In the Linux kernel, the following vulnerability has been resolved:
net: cpsw: Execute ndo_set_rx_mode callback in a work queue
Commit 1767bb2d47b7 ("ipv6: mcast: Don't hold RTNL for
IPV6_ADD_MEMBERSHIP and MCAST_JOIN_GROUP.") removed the RTNL lock for
IPV6_ADD_MEMBERSHIP and MCAST_JOIN_GROUP operations. However, this
change triggered the following call trace on my BeagleBone Black board:
WARNING: net/8021q/vlan_core.c:236 at vlan_for_each+0x120/0x124, CPU#0: rpcbind/481
RTNL: assertion failed…
CVSS vector
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.0 | Impact: 5.9
Affected Packages3 packages
▶CVEListV5linux/linux1767bb2d47b715a106287a8f963d9ec6cbab4e69 — 488009aa62bb1217ea0624fd5108b79adef4e148+2
🔴Vulnerability Details
5VulDB▶
Linux Kernel up to 6.18.9 net/8021q/vlan_core.c vlan_for_each assertion (Nessus ID 299117 / WID-SEC-2026-0421)↗2026-04-13
GHSA▶
GHSA-6rr8-q652-pwgf: In the Linux kernel, the following vulnerability has been resolved:
net: cpsw: Execute ndo_set_rx_mode callback in a work queue
Commit 1767bb2d47b7↗2026-02-14
OSV▶
CVE-2026-23175: In the Linux kernel, the following vulnerability has been resolved: net: cpsw: Execute ndo_set_rx_mode callback in a work queue Commit 1767bb2d47b7 ("↗2026-02-14