CVE-2026-23313 — Improper Update of Reference Count in Linux
Severity
7.1HIGH
No vectorEPSS
0.0%
top 93.78%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 25
Description
In the Linux kernel, the following vulnerability has been resolved:
i40e: Fix preempt count leak in napi poll tracepoint
Using get_cpu() in the tracepoint assignment causes an obvious preempt
count leak because nothing invokes put_cpu() to undo it:
softirq: huh, entered softirq 3 NET_RX with preempt_count 00000100, exited with 00000101?
This clearly has seen a lot of testing in the last 3+ years...
Use smp_processor_id() instead.
Affected Packages3 packages
▶CVEListV5linux/linux6d4d584a7ea8fc8d2be77545cb503118c193738a — b7e91827e1cf89cd34ad11dc8f8c010b70ab786e+4
🔴Vulnerability Details
4OSV▶
CVE-2026-23313: In the Linux kernel, the following vulnerability has been resolved: i40e: Fix preempt count leak in napi poll tracepoint Using get_cpu() in the tracep↗2026-03-25
GHSA▶
GHSA-94ww-55m5-gmrg: In the Linux kernel, the following vulnerability has been resolved:
i40e: Fix preempt count leak in napi poll tracepoint
Using get_cpu() in the trac↗2026-03-25