CVE-2026-23192

Severity
7.8HIGH
EPSS
0.0%
top 96.10%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 14

Description

In the Linux kernel, the following vulnerability has been resolved: linkwatch: use __dev_put() in callers to prevent UAF After linkwatch_do_dev() calls __dev_put() to release the linkwatch reference, the device refcount may drop to 1. At this point, netdev_run_todo() can proceed (since linkwatch_sync_dev() sees an empty list and returns without blocking), wait for the refcount to become 1 via netdev_wait_allrefs_any(), and then free the device via kobject_put(). This creates a use-after-free

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages3 packages

NVDlinux/linux_kernel6.15.16.18.10+2
CVEListV5linux/linux04efcee6ef8d0f01eef495db047e7216d6e6e38f2718ae6af7445ba2ee0abf6365ca43a9a3b16aeb+2
Debianlinux< 6.18.10-1

Patches

🔴Vulnerability Details

3
CVEList
linkwatch: use __dev_put() in callers to prevent UAF2026-02-14
OSV
CVE-2026-23192: In the Linux kernel, the following vulnerability has been resolved: linkwatch: use __dev_put() in callers to prevent UAF After linkwatch_do_dev() call2026-02-14
GHSA
GHSA-7g8g-mvq9-46w7: In the Linux kernel, the following vulnerability has been resolved: linkwatch: use __dev_put() in callers to prevent UAF After linkwatch_do_dev() ca2026-02-14

📋Vendor Advisories

2
Red Hat
kernel: linkwatch: use __dev_put() in callers to prevent UAF2026-02-14
Debian
CVE-2026-23192: linux - In the Linux kernel, the following vulnerability has been resolved: linkwatch: ...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-23192 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-23192 (HIGH CVSS 7.8) | In the Linux kernel | cvebase.io