Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
1816 articles · 103958 vulns · 38/41 feeds (7d)
← Back to list
0.0
CVE-2026-23452EXPLOITEDPATCHED
linux · linux kernel

PM: runtime: Fix a race condition related to device removal

Description

A vulnerability marked as critical has been reported in Linux Kernel up to 7.0-rc4. This vulnerability affects the function pm_runtime_work of the component PM. Performing a manipulation results in use after free. The attack must originate from the local network.

Affected Products

VendorProductVersions
linuxlinux kernel5e928f77a09a07f9dd595bb8a489965d69a83458, 5e928f77a09a07f9dd595bb8a489965d69a83458, 5e928f77a09a07f9dd595bb8a489965d69a83458, 5e928f77a09a07f9dd595bb8a489965d69a83458, 5e928f77a09a07f9dd595bb8a489965d69a83458, 5e928f77a09a07f9dd595bb8a489965d69a83458, 2.6.32, 6.1.167, 6.6.130, 6.12.78, 6.18.20, 7.0-rc4

References

  • https://git.kernel.org/stable/c/5649b46af8b167259e8a8e4e7eb3667ce74554b5
  • https://git.kernel.org/stable/c/39f2d86f2ddde8d1beda05732f30c7cd945e0b5a
  • https://git.kernel.org/stable/c/c6febaacfb8a0aec7d771a0e6c21cd68102d5679
  • https://git.kernel.org/stable/c/bb081fd37f8312651140d7429557258afe51693d
  • https://git.kernel.org/stable/c/cf65a77c0f9531eb6cfb97cc040974d2d8fff043
  • https://git.kernel.org/stable/c/29ab768277617452d88c0607c9299cdc63b6e9ff

Related News (2 articles)

Tier C
VulDB6h ago
CVE-2026-23452 | Linux Kernel up to 7.0-rc4 PM pm_runtime_work use after free
→ No new info (linked only)
Tier C
Linux Kernel CVEs7h ago
CVE-2026-23452: PM: runtime: Fix a race condition related to device removal
→ No new info (linked only)
CVSS 3.10.0 CRITICAL
CISA KEV❌ No
Actively exploited✅ Yes
Patch available
5649b46af8b167259e8a8e4e7eb3667ce74554b5
PublishedApr 3, 2026
Last enriched6h agov3
Trending Score60
Source articles2
Independent2
Info Completeness9/14
Missing: epss, cwe, kev, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

CRITICALCVE-2026-23463EXP
soc: fsl: qbman: fix race condition in qman_destroy_fq
Trending: 60
CRITICALCVE-2026-31396EXP
net: macb: fix use-after-free access to PTP clock
Trending: 60
CRITICALCVE-2026-23454EXP
net: mana: fix use-after-free in mana_hwc_destroy_channel() by reordering teardown
Trending: 60
CRITICALCVE-2026-23451EXP
bonding: prevent potential infinite loop in bond_header_parse()
Trending: 60
CRITICALCVE-2026-23444EXP
wifi: mac80211: always free skb on ieee80211_tx_prepare_skb() failure
Trending: 60

Pin to Dashboard

Verification

State: unverified
Confidence: 0%

Vulnerability Timeline

CVE Published
Apr 3, 2026
Discovered by ZDM
Apr 3, 2026
Actively Exploited
Apr 3, 2026
Exploit Available
Apr 3, 2026
Patch Available
Apr 3, 2026
Updated: description, affectedVersions, severity, cvssEstimate, exploitAvailable, activelyExploited, patchAvailable
Apr 3, 2026
Updated: description, affectedVersions, severity
Apr 3, 2026

Version History

v3
Last enriched 6h ago
v3Tier C6h ago

Updated severity to CRITICAL, added affected version 7.0-rc4, and noted that no exploit is available.

descriptionaffectedVersionsseverity
via VulDB
v2Tier C7h ago

Updated description with more technical detail, changed severity to HIGH, and marked the vulnerability as actively exploited with an exploit available.

descriptionaffectedVersionsseveritycvssEstimateexploitAvailableactivelyExploitedpatchAvailable
via Linux Kernel CVEs
v17h ago

Initial creation