CVE-2026-23186
📋 TL;DR
A race condition vulnerability in the Linux kernel's acpi_power_meter driver can cause system deadlocks when handling ACPI notifications. This affects Linux systems using the ACPI power meter functionality, potentially leading to system instability or denial of service.
💻 Affected Systems
- Linux kernel
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
System deadlock requiring hard reboot, causing extended downtime and potential data loss.
Likely Case
System instability, kernel panics, or service disruptions requiring manual intervention.
If Mitigated
Minor performance impact during ACPI notification handling with proper locking.
🎯 Exploit Status
Requires ability to trigger ACPI notifications or access to sysfs attributes while device removal occurs.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Kernel versions containing commits 615901b57b7ef8eb655f71358f7e956e42bcd16b and 8860ddf0e07be37169d4ef9f2618e39fca934a66
Vendor Advisory: https://git.kernel.org/stable/c/615901b57b7ef8eb655f71358f7e956e42bcd16b
Restart Required: No
Instructions:
1. Update Linux kernel to patched version. 2. For running systems, load updated kernel module: 'rmmod acpi_power_meter && modprobe acpi_power_meter'
🔧 Temporary Workarounds
Disable acpi_power_meter module
allPrevent loading of vulnerable driver if not required
echo 'blacklist acpi_power_meter' > /etc/modprobe.d/disable-acpi-power-meter.conf
rmmod acpi_power_meter
🧯 If You Can't Patch
- Restrict access to sysfs power meter attributes to trusted users only
- Monitor system logs for deadlock indicators and have reboot procedures ready
🔍 How to Verify
Check if Vulnerable:
Check if acpi_power_meter module is loaded: 'lsmod | grep acpi_power_meter'
Check Version:
uname -r
Verify Fix Applied:
Check kernel version includes fix commits: 'uname -r' and verify with distribution patch notes
📡 Detection & Monitoring
Log Indicators:
- Kernel messages about deadlocks
- System hangs or unresponsiveness
- ACPI notification errors
Network Indicators:
- None - local vulnerability only
SIEM Query:
kernel:("deadlock" OR "hung task") AND module:"acpi_power_meter"