CVE-2026-23402Trust Boundary Violation in Linux

Severity
5.5MEDIUM
No vector
EPSS
0.0%
top 94.14%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 1

Description

In the Linux kernel, the following vulnerability has been resolved: KVM: x86/mmu: Only WARN in direct MMUs when overwriting shadow-present SPTE Adjust KVM's sanity check against overwriting a shadow-present SPTE with a another SPTE with a different target PFN to only apply to direct MMUs, i.e. only to MMUs without shadowed gPTEs. While it's impossible for KVM to overwrite a shadow-present SPTE in response to a guest write, writes from outside the scope of KVM, e.g. from host userspace, aren't

Affected Packages2 packages

CVEListV5linux/linux11d45175111d933c5175acc28e56af2213dd5cd6bab090e8fd5607f77379ea78b9d0c683cb1538a9+3
debiandebian/linux< linux 6.19.11-1 (sid)

🔴Vulnerability Details

2
GHSA
GHSA-r3ww-97x6-6h4v: In the Linux kernel, the following vulnerability has been resolved: KVM: x86/mmu: Only WARN in direct MMUs when overwriting shadow-present SPTE Adju2026-04-01
OSV
CVE-2026-23402: In the Linux kernel, the following vulnerability has been resolved: KVM: x86/mmu: Only WARN in direct MMUs when overwriting shadow-present SPTE Adjust2026-04-01

📋Vendor Advisories

2
Red Hat
kernel: KVM: x86/mmu: Only WARN in direct MMUs when overwriting shadow-present SPTE2026-04-01
Debian
CVE-2026-23402: linux - In the Linux kernel, the following vulnerability has been resolved: KVM: x86/mm...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-23402 Impact, Exploitability, and Mitigation Steps | Wiz