CVE-2026-23274Use of Uninitialized Resource in Linux

Severity
7.8HIGHNVD
EPSS
0.0%
top 96.54%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 20

Description

In the Linux kernel, the following vulnerability has been resolved: netfilter: xt_IDLETIMER: reject rev0 reuse of ALARM timer labels IDLETIMER revision 0 rules reuse existing timers by label and always call mod_timer() on timer->timer. If the label was created first by revision 1 with XT_IDLETIMER_ALARM, the object uses alarm timer semantics and timer->timer is never initialized. Reusing that object from revision 0 causes mod_timer() on an uninitialized timer_list, triggering debugobjects war

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages3 packages

Linuxlinux/linux_kernel5.7.06.1.167+4
Debianlinux/linux_kernel< 6.19.10-1
CVEListV5linux/linux68983a354a655c35d3fb204489d383a2a051fda728c7cfaf0c0ab17cbd7754092116fd1af45271f9+6

🔴Vulnerability Details

4
GHSA
GHSA-3cwp-73f3-j7w3: In the Linux kernel, the following vulnerability has been resolved: netfilter: xt_IDLETIMER: reject rev0 reuse of ALARM timer labels IDLETIMER revis2026-03-20
OSV
netfilter: xt_IDLETIMER: reject rev0 reuse of ALARM timer labels2026-03-20
OSV
CVE-2026-23274: In the Linux kernel, the following vulnerability has been resolved: netfilter: xt_IDLETIMER: reject rev0 reuse of ALARM timer labels IDLETIMER revisio2026-03-20
CVEList
netfilter: xt_IDLETIMER: reject rev0 reuse of ALARM timer labels2026-03-20

📋Vendor Advisories

3
Red Hat
kernel: netfilter: xt_IDLETIMER: reject rev0 reuse of ALARM timer labels2026-03-20
Microsoft
netfilter: xt_IDLETIMER: reject rev0 reuse of ALARM timer labels2026-03-10
Debian
CVE-2026-23274: linux - In the Linux kernel, the following vulnerability has been resolved: netfilter: ...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-23274 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-23274 — Use of Uninitialized Resource in Linux | cvebase