CVE-2026-23203

7 documents7 sources
Severity
5.5MEDIUM
EPSS
0.0%
top 96.13%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 14

Description

In the Linux kernel, the following vulnerability has been resolved: net: cpsw_new: Execute ndo_set_rx_mode callback in a work queue Commit 1767bb2d47b7 ("ipv6: mcast: Don't hold RTNL for IPV6_ADD_MEMBERSHIP and MCAST_JOIN_GROUP.") removed the RTNL lock for IPV6_ADD_MEMBERSHIP and MCAST_JOIN_GROUP operations. However, this change triggered the following call trace on my BeagleBone Black board: WARNING: net/8021q/vlan_core.c:236 at vlan_for_each+0x120/0x124, CPU#0: rpcbind/496 RTNL: assertion fa

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages3 packages

NVDlinux/linux_kernel6.176.18.10+1
CVEListV5linux/linux1767bb2d47b715a106287a8f963d9ec6cbab4e69d5b3a669866977dc87fd56fcf00a70df1536d258+2
Debianlinux< 6.18.10-1

Patches

🔴Vulnerability Details

3
GHSA
GHSA-wr52-6c6f-x6gv: In the Linux kernel, the following vulnerability has been resolved: net: cpsw_new: Execute ndo_set_rx_mode callback in a work queue Commit 1767bb2d42026-02-14
OSV
CVE-2026-23203: In the Linux kernel, the following vulnerability has been resolved: net: cpsw_new: Execute ndo_set_rx_mode callback in a work queue Commit 1767bb2d47b2026-02-14
CVEList
net: cpsw_new: Execute ndo_set_rx_mode callback in a work queue2026-02-14

📋Vendor Advisories

2
Red Hat
kernel: net: cpsw_new: Execute ndo_set_rx_mode callback in a work queue2026-02-14
Debian
CVE-2026-23203: linux - In the Linux kernel, the following vulnerability has been resolved: net: cpsw_n...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-23203 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-23203 (MEDIUM CVSS 5.5) | In the Linux kernel | cvebase.io