Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
1771 articles · 103891 vulns · 38/41 feeds (7d)
← Back to list
0.0
CVE-2026-23452EXPLOITEDPATCHED
linux · linux kernel

PM: runtime: Fix a race condition related to device removal

Description

A vulnerability marked as critical has been reported in Linux Kernel up to 7.0-rc4. This vulnerability affects the function pm_runtime_work of the component PM. Performing a manipulation results in use after free. The attack must originate from the local network.

Affected Products

VendorProductVersions
linuxlinux kernel5e928f77a09a07f9dd595bb8a489965d69a83458, 5e928f77a09a07f9dd595bb8a489965d69a83458, 5e928f77a09a07f9dd595bb8a489965d69a83458, 5e928f77a09a07f9dd595bb8a489965d69a83458, 5e928f77a09a07f9dd595bb8a489965d69a83458, 5e928f77a09a07f9dd595bb8a489965d69a83458, 2.6.32, 6.1.167, 6.6.130, 6.12.78, 6.18.20, 7.0-rc4

References

  • https://git.kernel.org/stable/c/5649b46af8b167259e8a8e4e7eb3667ce74554b5
  • https://git.kernel.org/stable/c/39f2d86f2ddde8d1beda05732f30c7cd945e0b5a
  • https://git.kernel.org/stable/c/c6febaacfb8a0aec7d771a0e6c21cd68102d5679
  • https://git.kernel.org/stable/c/bb081fd37f8312651140d7429557258afe51693d
  • https://git.kernel.org/stable/c/cf65a77c0f9531eb6cfb97cc040974d2d8fff043
  • https://git.kernel.org/stable/c/29ab768277617452d88c0607c9299cdc63b6e9ff

Related News (2 articles)

Tier C
VulDB4h ago
CVE-2026-23452 | Linux Kernel up to 7.0-rc4 PM pm_runtime_work use after free
→ No new info (linked only)
Tier C
Linux Kernel CVEs5h ago
CVE-2026-23452: PM: runtime: Fix a race condition related to device removal
→ No new info (linked only)
CVSS 3.10.0 CRITICAL
CISA KEV❌ No
Actively exploited✅ Yes
Patch available
5649b46af8b167259e8a8e4e7eb3667ce74554b5
PublishedApr 3, 2026
Last enriched4h agov3
Trending Score60
Source articles2
Independent2
Info Completeness9/14
Missing: epss, cwe, kev, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

CRITICALCVE-2026-23461EXP
Bluetooth: L2CAP: Fix use-after-free in l2cap_unregister_user
Trending: 60
CRITICALCVE-2026-23475EXP
spi: fix statistics allocation
Trending: 60
CRITICALCVE-2026-23443EXP
ACPI: processor: Fix previous acpi_processor_errata_piix4() fix
Trending: 60
CRITICALCVE-2026-23467EXP
drm/i915/dmc: Fix an unlikely NULL pointer deference at probe
Trending: 60
CRITICALCVE-2026-23427EXP
ksmbd: fix use-after-free in durable v2 replay of active file handles
Trending: 60

Pin to Dashboard

Verification

State: unverified
Confidence: 0%

Vulnerability Timeline

CVE Published
Apr 3, 2026
Discovered by ZDM
Apr 3, 2026
Actively Exploited
Apr 3, 2026
Exploit Available
Apr 3, 2026
Patch Available
Apr 3, 2026
Updated: description, affectedVersions, severity, cvssEstimate, exploitAvailable, activelyExploited, patchAvailable
Apr 3, 2026
Updated: description, affectedVersions, severity
Apr 3, 2026

Version History

v3
Last enriched 4h ago
v3Tier C4h ago

Updated severity to CRITICAL, added affected version 7.0-rc4, and noted that no exploit is available.

descriptionaffectedVersionsseverity
via VulDB
v2Tier C5h ago

Updated description with more technical detail, changed severity to HIGH, and marked the vulnerability as actively exploited with an exploit available.

descriptionaffectedVersionsseveritycvssEstimateexploitAvailableactivelyExploitedpatchAvailable
via Linux Kernel CVEs
v15h ago

Initial creation