CVE-2026-23180
📋 TL;DR
A bounds check vulnerability in the Linux kernel's dpaa2-switch driver allows an out-of-bounds read when processing hardware interrupts. This affects systems using the dpaa2-switch driver, potentially leading to kernel crashes or information disclosure. The vulnerability is triggered when the IRQ handler receives a malformed hardware status register value.
💻 Affected Systems
- Linux kernel with dpaa2-switch driver
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Kernel panic leading to system crash, potential information disclosure from kernel memory, or local privilege escalation if combined with other vulnerabilities.
Likely Case
System instability or kernel crash causing denial of service on affected systems.
If Mitigated
Minimal impact with proper kernel hardening and isolation of affected systems.
🎯 Exploit Status
Exploitation requires ability to trigger hardware interrupts with malformed status register values, typically requiring local access or control of hardware components.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Kernel versions containing the fix commits: 1b381a638e1851d8cfdfe08ed9cdbec5295b18c9, 2447edc367800ba914acf7ddd5d250416b45fb31, 31a7a0bbeb006bac2d9c81a2874825025214b6d8, 34b56c16efd61325d80bf1d780d0e176be662f59, 77611cab5bdfff7a070ae574bbfba20a1de99d1b
Vendor Advisory: https://git.kernel.org/stable/c/1b381a638e1851d8cfdfe08ed9cdbec5295b18c9
Restart Required: No
Instructions:
1. Update to a kernel version containing the fix commits. 2. For custom kernels, apply the patch from the git commit. 3. Rebuild and deploy the updated kernel.
🔧 Temporary Workarounds
Disable dpaa2-switch driver
allRemove or blacklist the dpaa2-switch driver if not required
echo 'blacklist dpaa2-switch' >> /etc/modprobe.d/blacklist.conf
rmmod dpaa2-switch
🧯 If You Can't Patch
- Isolate affected systems from untrusted networks and users
- Implement strict access controls to prevent unauthorized hardware interaction
🔍 How to Verify
Check if Vulnerable:
Check if dpaa2-switch driver is loaded: lsmod | grep dpaa2_switch. Check kernel version against patched versions.
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version includes the fix commits. Check dmesg for driver loading without errors.
📡 Detection & Monitoring
Log Indicators:
- Kernel panic messages
- dpaa2-switch driver crash logs
- Out of bounds memory access warnings in kernel logs
Network Indicators:
- Sudden loss of network connectivity on affected interfaces
SIEM Query:
source="kernel" AND ("dpaa2-switch" OR "out of bounds" OR "kernel panic")
🔗 References
- https://git.kernel.org/stable/c/1b381a638e1851d8cfdfe08ed9cdbec5295b18c9
- https://git.kernel.org/stable/c/2447edc367800ba914acf7ddd5d250416b45fb31
- https://git.kernel.org/stable/c/31a7a0bbeb006bac2d9c81a2874825025214b6d8
- https://git.kernel.org/stable/c/34b56c16efd61325d80bf1d780d0e176be662f59
- https://git.kernel.org/stable/c/77611cab5bdfff7a070ae574bbfba20a1de99d1b
- https://git.kernel.org/stable/c/f89e33c9c37f0001b730e23b3b05ab7b1ecface2