CVE-2026-23005
BaseFortify
Publication date: 2026-01-25
Last updated on: 2026-03-25
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 5.17 |
| linux | linux_kernel | From 6.13 (inc) to 6.18.7 (exc) |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | From 6.2 (inc) to 6.6.122 (exc) |
| linux | linux_kernel | From 6.7 (inc) to 6.12.67 (exc) |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | From 5.17.1 (inc) to 6.1.162 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the Linux kernel's handling of the XSAVE state in virtualized environments using KVM. Specifically, when loading guest XSAVE state or updating the XFD register, the kernel failed to clear certain bits (XSTATE_BV[i]) corresponding to features disabled by the guest's XFD. This mismatch can cause the kernel to attempt to load state for disabled features, leading to a device-not-available (#NM) exception and kernel panic. The issue arises in scenarios such as when a guest executes WRMSR to set XFD bits and an interrupt triggers kernel_fpu_begin() before the update completes, or when userspace sets XSTATE_BV bits improperly via KVM_SET_XSAVE. The fix ensures that XSTATE_BV bits are cleared for features disabled by XFD, preventing the kernel from loading invalid state and avoiding crashes.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to panic and crash when running virtual machines under KVM, due to improper handling of floating-point unit (FPU) state related to disabled features. Such kernel panics can lead to denial of service for the affected virtual machines or hosts, potentially disrupting services and causing system instability.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability manifests as kernel panics with warnings related to exc_device_not_available and XRSTOR #NM errors in the kernel logs. Detection involves monitoring the system kernel logs for messages similar to: "WARNING: arch/x86/kernel/traps.c:1524 at exc_device_not_available+0x101/0x110" and call traces involving kvm and fpu functions. You can check the kernel logs using commands like: - dmesg | grep exc_device_not_available - journalctl -k | grep exc_device_not_available These commands help identify if the kernel has encountered the specific fault caused by this vulnerability during guest XSAVE state loading or WRMSR operations.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves updating the Linux kernel to a version where this vulnerability is resolved. The fix ensures that when loading guest XSAVE state or updating XFD, the kernel clears XFD-disabled features in the saved XSTATE_BV to prevent kernel panics. Until the kernel is updated, avoid workloads or guest operations that trigger WRMSR(MSR_IA32_XFD) with XFD[18]=1 or use KVM_SET_XSAVE with inconsistent XSTATE_BV settings. Monitoring and restricting such guest operations can reduce the risk of kernel panics caused by this issue.