CVE-2026-23180

N/A Unknown

📋 TL;DR

A bounds check vulnerability in the Linux kernel's dpaa2-switch driver allows an out-of-bounds read when processing hardware interrupts. This affects systems using the dpaa2-switch driver, potentially leading to kernel crashes or information disclosure. The vulnerability is triggered when the IRQ handler receives a malformed hardware status register value.

💻 Affected Systems

Products:
  • Linux kernel with dpaa2-switch driver
Versions: Kernel versions containing vulnerable dpaa2-switch driver code before the fix commits
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with dpaa2-switch driver enabled and in use (typically NXP DPAA2-based networking hardware)

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to system crash, potential information disclosure from kernel memory, or local privilege escalation if combined with other vulnerabilities.

🟠

Likely Case

System instability or kernel crash causing denial of service on affected systems.

🟢

If Mitigated

Minimal impact with proper kernel hardening and isolation of affected systems.

🌐 Internet-Facing: LOW - This requires local access or ability to trigger hardware interrupts, not typically exploitable remotely.
🏢 Internal Only: MEDIUM - Internal systems using dpaa2-switch driver could experience crashes or instability if malicious hardware events occur.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires ability to trigger hardware interrupts with malformed status register values, typically requiring local access or control of hardware components.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Kernel versions containing the fix commits: 1b381a638e1851d8cfdfe08ed9cdbec5295b18c9, 2447edc367800ba914acf7ddd5d250416b45fb31, 31a7a0bbeb006bac2d9c81a2874825025214b6d8, 34b56c16efd61325d80bf1d780d0e176be662f59, 77611cab5bdfff7a070ae574bbfba20a1de99d1b

Vendor Advisory: https://git.kernel.org/stable/c/1b381a638e1851d8cfdfe08ed9cdbec5295b18c9

Restart Required: No

Instructions:

1. Update to a kernel version containing the fix commits. 2. For custom kernels, apply the patch from the git commit. 3. Rebuild and deploy the updated kernel.

🔧 Temporary Workarounds

Disable dpaa2-switch driver

all

Remove or blacklist the dpaa2-switch driver if not required

echo 'blacklist dpaa2-switch' >> /etc/modprobe.d/blacklist.conf
rmmod dpaa2-switch

🧯 If You Can't Patch

  • Isolate affected systems from untrusted networks and users
  • Implement strict access controls to prevent unauthorized hardware interaction

🔍 How to Verify

Check if Vulnerable:

Check if dpaa2-switch driver is loaded: lsmod | grep dpaa2_switch. Check kernel version against patched versions.

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version includes the fix commits. Check dmesg for driver loading without errors.

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages
  • dpaa2-switch driver crash logs
  • Out of bounds memory access warnings in kernel logs

Network Indicators:

  • Sudden loss of network connectivity on affected interfaces

SIEM Query:

source="kernel" AND ("dpaa2-switch" OR "out of bounds" OR "kernel panic")

🔗 References

📤 Share & Export