CVE-2026-23156
📋 TL;DR
A Linux kernel vulnerability in the efivarfs subsystem where efivar_entry_get() fails to properly propagate errors from __efivar_entry_get(). This allows uninitialized heap memory to be copied to userspace via efivarfs_file_read(), potentially leaking sensitive kernel memory. Systems running affected Linux kernel versions with efivarfs enabled are vulnerable.
💻 Affected Systems
- Linux kernel
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Kernel memory information disclosure leading to privilege escalation or system compromise if combined with other vulnerabilities.
Likely Case
Information disclosure of kernel memory contents, potentially exposing sensitive data like encryption keys or memory addresses.
If Mitigated
Minimal impact with proper access controls limiting efivarfs access to privileged users only.
🎯 Exploit Status
Exploitation requires local access and ability to read from efivarfs, typically requiring elevated privileges.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Patched in stable kernel versions referenced in the git commits
Vendor Advisory: https://git.kernel.org/stable/c/3960f1754664661a970dc9ebbab44ff93a0b4c42
Restart Required: Yes
Instructions:
1. Update to a patched kernel version from your distribution vendor. 2. Reboot the system to load the new kernel.
🔧 Temporary Workarounds
Restrict efivarfs access
LinuxLimit access to efivarfs filesystem to prevent exploitation
chmod 600 /sys/firmware/efi/efivars/*
mount -o remount,noexec,nosuid /sys/firmware/efi/efivars
🧯 If You Can't Patch
- Implement strict access controls on efivarfs directories
- Monitor for unusual access patterns to efivarfs files
🔍 How to Verify
Check if Vulnerable:
Check kernel version and verify if efivarfs is accessible. Vulnerable if running unpatched kernel with efivarfs mounted.
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version is updated to a patched version and test efivarfs functionality.
📡 Detection & Monitoring
Log Indicators:
- Unusual read operations on efivarfs files by non-privileged users
- Kernel oops or warnings related to efivarfs
Network Indicators:
- None - local vulnerability only
SIEM Query:
process.name="cat" AND file.path="/sys/firmware/efi/efivars/*" AND user.name!="root"
🔗 References
- https://git.kernel.org/stable/c/3960f1754664661a970dc9ebbab44ff93a0b4c42
- https://git.kernel.org/stable/c/4b22ec1685ce1fc0d862dcda3225d852fb107995
- https://git.kernel.org/stable/c/510a16f1c5c1690b33504052bc13fbc2772c23f8
- https://git.kernel.org/stable/c/89b8ca709eeeabcc11ebba64806677873a2787a8
- https://git.kernel.org/stable/c/e4e15a0a4403c96d9898d8398f0640421df9cb16