CVE-2026-23452 — Signal Handler Race Condition in Linux
Severity
5.5MEDIUM
No vectorEPSS
0.0%
top 90.94%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 3
Description
In the Linux kernel, the following vulnerability has been resolved:
PM: runtime: Fix a race condition related to device removal
The following code in pm_runtime_work() may dereference the dev->parent
pointer after the parent device has been freed:
/* Maybe the parent is now able to suspend. */
if (parent && !parent->power.ignore_children) {
spin_unlock(&dev->power.lock);
spin_lock(&parent->power.lock);
rpm_idle(parent, RPM_ASYNC);
spin_unlock(&parent->power.lock);
spin_lock(&dev->power.lock…
Affected Packages3 packages
▶CVEListV5linux/linux5e928f77a09a07f9dd595bb8a489965d69a83458 — 5649b46af8b167259e8a8e4e7eb3667ce74554b5+6
🔴Vulnerability Details
2OSV▶
CVE-2026-23452: In the Linux kernel, the following vulnerability has been resolved: PM: runtime: Fix a race condition related to device removal The following code in↗2026-04-03
GHSA▶
GHSA-vxcm-6fmh-2q7q: In the Linux kernel, the following vulnerability has been resolved:
PM: runtime: Fix a race condition related to device removal
The following code i↗2026-04-03