CVE-2026-23198
BaseFortify
Publication date: 2026-02-14
Last updated on: 2026-04-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | From 5.16 (inc) to 6.1.163 (exc) |
| linux | linux_kernel | From 6.7 (inc) to 6.12.70 (exc) |
| linux | linux_kernel | From 6.2 (inc) to 6.6.124 (exc) |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | From 6.13 (inc) to 6.18.10 (exc) |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | From 5.11 (inc) to 5.15.200 (exc) |
| linux | linux_kernel | From 4.4 (inc) to 5.10.250 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-476 | The product dereferences a pointer that it expects to be valid but is NULL. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's KVM (Kernel-based Virtual Machine) subsystem. It involves improper handling when deassigning an irqfd (interrupt request file descriptor). Specifically, the irqfd's copy of the IRQ's routing entry is clobbered (overwritten) incorrectly, which breaks certain architecture-specific functions on x86 and arm64 platforms that rely on the routing type KVM_IRQ_ROUTING_MSI.
The problem arises because the kernel consumes routing information without verifying if the irqfd is still active, leading to the use of stale or incorrect routing data. This can cause KVM to incorrectly keep IRQs in bypass mode, which is especially problematic on AMD hardware where IRQs are tracked in a list tied to the irqfd's lifetime.
The vulnerability can lead to serious kernel errors such as NULL pointer dereferences and list corruption, resulting in kernel crashes or undefined behavior during interrupt handling in virtualized environments.
How can this vulnerability impact me? :
This vulnerability can cause kernel crashes and instability in systems running virtual machines using KVM, particularly on x86 and arm64 architectures and AMD hardware. The improper handling of irqfd routing can lead to NULL pointer dereferences and list corruption, which may result in system crashes or unpredictable behavior.
For users relying on virtualization, this could mean loss of service, data corruption, or the need for system reboots. It may also affect the reliability and security of virtualized workloads.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
I don't know