Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
1248 articles · 101974 vulns · 38/41 feeds (7d)
← Back to list
—
CVE-2026-23413EXPLOITEDPATCHED
linux · linux kernel

clsact: Fix use-after-free in init/destroy rollback asymmetry

Description

A vulnerability classified as critical was found in Linux Kernel up to 6.6.129/6.12.77/6.18.19/6.19.9/7.0-rc4. This impacts the function clsact_init. The manipulation results in use after free. This vulnerability was named CVE-2026-23413. The attack needs to be approached within the local network. There is no available exploit. Upgrading the affected component is advised.

Affected Products

VendorProductVersions
linuxlinux kernel230bb13650b0f186f540500fd5f5f7096a822a2a, 1cb6f0bae50441f4b4b32a28315853b279c7404e, 1cb6f0bae50441f4b4b32a28315853b279c7404e, 1cb6f0bae50441f4b4b32a28315853b279c7404e, 1cb6f0bae50441f4b4b32a28315853b279c7404e, f61ecf1bd5b562ebfd7d430ccb31619857e80857, 6.10, 6.6.129, 6.12.77, 6.18.19, 6.19.9, 7.0-rc4

References

  • https://git.kernel.org/stable/c/a73d95b57bf9faebdfed591bcb7ed9292062a84c
  • https://git.kernel.org/stable/c/37bef86e5428d59f70a4da82b80f9a8f252fecbe
  • https://git.kernel.org/stable/c/4c9af67f99aa3e51b522c54968ab3ac8272be41c
  • https://git.kernel.org/stable/c/0509b762bc5e8ea7b8391130730c6d8502fc6e69
  • https://git.kernel.org/stable/c/a0671125d4f55e1e98d9bde8a0b671941987e208

Related News (1 articles)

Tier C
VulDB6h ago
CVE-2026-23413 | Linux Kernel up to 6.6.129/6.12.77/6.18.19/6.19.9/7.0-rc4 clsact_init use after free
→ No new info (linked only)
CISA KEV❌ No
Actively exploited✅ Yes
Patch available
a73d95b57bf9faebdfed591bcb7ed9292062a84c37bef86e5428d59f70a4da82b80f9a8f252fecbe4c9af67f99aa3e51b522c54968ab3ac8272be41c0509b762bc5e8ea7b8391130730c6d8502fc6e69a0671125d4f55e1e98d9bde8a0b671941987e20806.6.1306.12.786.18.206.19.107.0-rc5
PublishedApr 2, 2026
Last enriched6h agov2
Trending Score48
Source articles1
Independent1
Info Completeness7/14
Missing: cvss, epss, cwe, kev, exploit, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

CRITICALCVE-2026-23416EXP
mm/mseal: update VMA end correctly on merge
Trending: 48
CRITICALCVE-2026-23417EXP
bpf: Fix constant blinding for PROBE_MEM32 stores
Trending: 48
CRITICALCVE-2026-23412
netfilter: bpf: defer hook memory release until rcu readers are done
Trending: 40
MEDIUMCVE-2026-22977
In the Linux kernel, the following vulnerability has been resolved: net: sock: fix hardened usercopy panic in sock_recv_errqueue skbuff_fclone_cache was created without defining a usercopy region, [
Trending: 31
CRITICALCVE-2026-23414
tls: Purge async_hold in tls_decrypt_async_wait()
Trending: 29

Pin to Dashboard

Verification

State: unverified
Confidence: 0%

Vulnerability Timeline

CVE Published
Apr 2, 2026
Actively Exploited
Apr 2, 2026
Patch Available
Apr 2, 2026
Discovered by ZDM
Apr 2, 2026
Updated: description, affectedVersions, severity, activelyExploited
Apr 2, 2026

Version History

v2
Last enriched 6h ago
v2Tier C6h ago

Updated severity to CRITICAL, added affected versions, and corrected exploit availability.

descriptionaffectedVersionsseverityactivelyExploited
via VulDB
v16h ago

Initial creation