CVE-2026-23414Improper Update of Reference Count in Linux

Severity
5.5MEDIUM
No vector
EPSS
0.0%
top 90.94%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 2
Latest updateApr 3

Description

In the Linux kernel, the following vulnerability has been resolved: tls: Purge async_hold in tls_decrypt_async_wait() The async_hold queue pins encrypted input skbs while the AEAD engine references their scatterlist data. Once tls_decrypt_async_wait() returns, every AEAD operation has completed and the engine no longer references those skbs, so they can be freed unconditionally. A subsequent patch adds batch async decryption to tls_sw_read_sock(), introducing a new call site that must drain p

Affected Packages2 packages

CVEListV5linux/linux9f83fd0c179e0f458e824e417f9d5ad53443f685ac435be7c7613eb13a5a8ceb5182e10b50c9ce87+7
debiandebian/linux< linux 6.19.11-1 (sid)

🔴Vulnerability Details

3
OSV
CVE-2026-23414: (In the Linux kernel, the following vulnerability has been resolved: t2026-04-03
OSV
CVE-2026-23414: In the Linux kernel, the following vulnerability has been resolved: tls: Purge async_hold in tls_decrypt_async_wait() The async_hold queue pins encryp2026-04-02
GHSA
GHSA-8fgp-q3pf-q3rh: In the Linux kernel, the following vulnerability has been resolved: tls: Purge async_hold in tls_decrypt_async_wait() The async_hold queue pins encr2026-04-02

📋Vendor Advisories

2
Red Hat
kernel: tls: Purge async_hold in tls_decrypt_async_wait()2026-04-02
Debian
CVE-2026-23414: linux - In the Linux kernel, the following vulnerability has been resolved: tls: Purge ...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-23414 Impact, Exploitability, and Mitigation Steps | Wiz