CVE-2026-23134

7 documents7 sources
Severity
5.5MEDIUM
EPSS
0.0%
top 96.16%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 14

Description

In the Linux kernel, the following vulnerability has been resolved: slab: fix kmalloc_nolock() context check for PREEMPT_RT On PREEMPT_RT kernels, local_lock becomes a sleeping lock. The current check in kmalloc_nolock() only verifies we're not in NMI or hard IRQ context, but misses the case where preemption is disabled. When a BPF program runs from a tracepoint with preemption disabled (preempt_count > 0), kmalloc_nolock() proceeds to call local_lock_irqsave() which attempts to acquire a sle

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages3 packages

NVDlinux/linux_kernel6.186.18.8+1
CVEListV5linux/linuxaf92793e52c3a99b828ed4bdd277fd3e11c18d08f60ba4a97ae3f94e4818722ed2e4d260bbb17b44+2
Debianlinux< 6.18.8-1

Patches

🔴Vulnerability Details

3
GHSA
GHSA-gc4v-h3f5-h83f: In the Linux kernel, the following vulnerability has been resolved: slab: fix kmalloc_nolock() context check for PREEMPT_RT On PREEMPT_RT kernels, l2026-02-14
CVEList
slab: fix kmalloc_nolock() context check for PREEMPT_RT2026-02-14
OSV
CVE-2026-23134: In the Linux kernel, the following vulnerability has been resolved: slab: fix kmalloc_nolock() context check for PREEMPT_RT On PREEMPT_RT kernels, loc2026-02-14

📋Vendor Advisories

2
Red Hat
kernel: slab: fix kmalloc_nolock() context check for PREEMPT_RT2026-02-14
Debian
CVE-2026-23134: linux - In the Linux kernel, the following vulnerability has been resolved: slab: fix k...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-23134 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-23134 (MEDIUM CVSS 5.5) | In the Linux kernel | cvebase.io