CVE-2026-23134
📋 TL;DR
A race condition vulnerability in the Linux kernel's slab allocator that can cause kernel panics on PREEMPT_RT (Real-Time) kernels. When kmalloc_nolock() is called from contexts with disabled preemption (like BPF programs from tracepoints), it attempts to acquire a sleeping lock, triggering a BUG condition. This affects systems running PREEMPT_RT kernels with specific configurations.
💻 Affected Systems
- Linux kernel
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Kernel panic leading to system crash and denial of service, potentially disrupting critical real-time operations.
Likely Case
System instability or crashes when BPF programs run from tracepoints with preemption disabled on PREEMPT_RT kernels.
If Mitigated
No impact on standard Linux kernels; limited to specific PREEMPT_RT configurations.
🎯 Exploit Status
Exploitation requires local access and ability to trigger specific kernel code paths with preemption disabled.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Kernel versions containing commits 99a3e3a1cfc93b8fe318c0a3a5cfb01f1d4ad53c and f60ba4a97ae3f94e4818722ed2e4d260bbb17b44
Vendor Advisory: https://git.kernel.org/stable/c/99a3e3a1cfc93b8fe318c0a3a5cfb01f1d4ad53c
Restart Required: Yes
Instructions:
1. Update Linux kernel to version containing the fix commits. 2. Rebuild kernel if using custom kernel. 3. Reboot system to load new kernel.
🔧 Temporary Workarounds
Disable PREEMPT_RT
allSwitch to standard kernel configuration without real-time patches
# Reconfigure kernel without PREEMPT_RT options
# Rebuild and install kernel
Avoid vulnerable code paths
allPrevent BPF programs from running in tracepoints with preemption disabled
# Modify BPF program configurations
# Adjust tracepoint usage
🧯 If You Can't Patch
- Monitor system logs for kernel panic/BUG messages related to slab allocation
- Implement strict access controls to prevent unauthorized local code execution
🔍 How to Verify
Check if Vulnerable:
Check kernel configuration for PREEMPT_RT and examine kernel version against patched versions
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version includes the fix commits and test BPF programs with tracepoints
📡 Detection & Monitoring
Log Indicators:
- Kernel panic messages
- BUG: sleeping function called from invalid context
- slab allocation errors
Network Indicators:
- None - local vulnerability only
SIEM Query:
source="kernel" AND ("sleeping function called from invalid context" OR "slab" OR "kmalloc_nolock")