CVE-2026-23198

N/A Unknown

📋 TL;DR

A race condition vulnerability in the Linux kernel's KVM subsystem where deassigning an irqfd (interrupt request file descriptor) incorrectly clobbers routing information, potentially causing use-after-free conditions, NULL pointer dereferences, or list corruption. This affects systems using KVM virtualization with irqfd functionality, particularly on x86 and arm64 architectures.

💻 Affected Systems

Products:
  • Linux kernel with KVM enabled
Versions: Specific affected kernel versions not specified in CVE description; check git commits for exact ranges
Operating Systems: Linux distributions using vulnerable kernel versions
Default Config Vulnerable: ✅ No
Notes: Requires KVM virtualization enabled and irqfd functionality in use; particularly affects x86 and arm64 architectures with AMD processors showing specific symptoms.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic, system crash, or memory corruption leading to denial of service or potential privilege escalation in virtualized environments.

🟠

Likely Case

System crashes or instability when managing virtual machine interrupts, particularly during irqfd deassignment operations.

🟢

If Mitigated

Minimal impact with proper patching; the vulnerability requires specific KVM configurations and operations to trigger.

🌐 Internet-Facing: LOW - This is a kernel-level vulnerability requiring local access to the host system and specific KVM operations.
🏢 Internal Only: MEDIUM - Affects virtualization hosts where users have privileges to manage VM interrupts; could be exploited by malicious users or through VM escape attempts.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access to the host system, KVM privileges, and triggering specific race conditions during irqfd deassignment operations.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check git commits: 2284bc168b148a17b5ca3b37b3d95c411f18a08d, 4385b2f2843549bfb932e0dcf76bf4b065543a3c, 6d14ba1e144e796b5fc81044f08cfba9024ca195, 959a063e7f12524bc1871ad1f519787967bbcd45, b4d37cdb77a0015f51fee083598fa227cc07aaf1

Vendor Advisory: https://git.kernel.org/stable/c/2284bc168b148a17b5ca3b37b3d95c411f18a08d

Restart Required: Yes

Instructions:

1. Identify your Linux kernel version. 2. Check if patches are available for your distribution. 3. Update kernel package through your package manager. 4. Reboot system to load new kernel.

🔧 Temporary Workarounds

Disable KVM irqfd functionality

Linux

Prevent use of irqfd interrupts in KVM to avoid triggering the vulnerability

echo 0 > /sys/module/kvm/parameters/enable_irqfd

🧯 If You Can't Patch

  • Restrict KVM access to trusted users only
  • Monitor system logs for kernel panic or NULL pointer dereference events

🔍 How to Verify

Check if Vulnerable:

Check kernel version and if KVM is enabled: uname -r && lsmod | grep kvm

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version after update and check that KVM module loads without errors

📡 Detection & Monitoring

Log Indicators:

  • Kernel NULL pointer dereference messages
  • list_add corruption errors
  • BUG: kernel NULL pointer dereference in amd_iommu_update_ga

Network Indicators:

  • No network indicators - this is a local kernel vulnerability

SIEM Query:

source="kernel" AND ("NULL pointer dereference" OR "list_add corruption" OR "amd_iommu_update_ga")

🔗 References

📤 Share & Export