CVE-2026-23414 — Improper Update of Reference Count in Linux
Severity
5.5MEDIUM
No vectorEPSS
0.0%
top 90.94%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 2
Latest updateApr 3
Description
In the Linux kernel, the following vulnerability has been resolved:
tls: Purge async_hold in tls_decrypt_async_wait()
The async_hold queue pins encrypted input skbs while
the AEAD engine references their scatterlist data. Once
tls_decrypt_async_wait() returns, every AEAD operation
has completed and the engine no longer references those
skbs, so they can be freed unconditionally.
A subsequent patch adds batch async decryption to
tls_sw_read_sock(), introducing a new call site that
must drain p…
Affected Packages2 packages
▶CVEListV5linux/linux9f83fd0c179e0f458e824e417f9d5ad53443f685 — ac435be7c7613eb13a5a8ceb5182e10b50c9ce87+7
🔴Vulnerability Details
3OSV
▶
OSV▶
CVE-2026-23414: In the Linux kernel, the following vulnerability has been resolved: tls: Purge async_hold in tls_decrypt_async_wait() The async_hold queue pins encryp↗2026-04-02
GHSA▶
GHSA-8fgp-q3pf-q3rh: In the Linux kernel, the following vulnerability has been resolved:
tls: Purge async_hold in tls_decrypt_async_wait()
The async_hold queue pins encr↗2026-04-02