CVE-2026-23393Expired Pointer Dereference in Linux

Severity
7.8HIGHNVD
EPSS
0.0%
top 97.75%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 25

Description

In the Linux kernel, the following vulnerability has been resolved: bridge: cfm: Fix race condition in peer_mep deletion When a peer MEP is being deleted, cancel_delayed_work_sync() is called on ccm_rx_dwork before freeing. However, br_cfm_frame_rx() runs in softirq context under rcu_read_lock (without RTNL) and can re-schedule ccm_rx_dwork via ccm_rx_timer_start() between cancel_delayed_work_sync() returning and kfree_rcu() being called. The following is a simple race scenario: cpu0 cpu1 m

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages5 packages

Linuxlinux/linux_kernel5.11.06.12.78+2
Debianlinux/linux_kernel< 6.19.10-1
CVEListV5linux/linuxdc32cbb3dbd7da38c700d6e0fc6354df24920525e89dbd2736a45f0507949af4748cbbf3ff793146+4
debiandebian/linux< linux 6.19.10-1 (forky)

🔴Vulnerability Details

3
OSV
CVE-2026-23393: In the Linux kernel, the following vulnerability has been resolved: bridge: cfm: Fix race condition in peer_mep deletion When a peer MEP is being dele2026-03-25
OSV
bridge: cfm: Fix race condition in peer_mep deletion2026-03-25
GHSA
GHSA-27jv-r6jg-f5fr: In the Linux kernel, the following vulnerability has been resolved: bridge: cfm: Fix race condition in peer_mep deletion When a peer MEP is being de2026-03-25

📋Vendor Advisories

3
Red Hat
kernel: bridge: cfm: Fix race condition in peer_mep deletion2026-03-25
Microsoft
bridge: cfm: Fix race condition in peer_mep deletion2026-03-10
Debian
CVE-2026-23393: linux - In the Linux kernel, the following vulnerability has been resolved: bridge: cfm...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-23393 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-23393 — Expired Pointer Dereference in Linux | cvebase