CVE-2026-23429Signal Handler Race Condition in Linux

Severity
5.3MEDIUM
No vector
EPSS
0.0%
top 94.14%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 3

Description

In the Linux kernel, the following vulnerability has been resolved: iommu/sva: Fix crash in iommu_sva_unbind_device() domain->mm->iommu_mm can be freed by iommu_domain_free(): iommu_domain_free() mmdrop() __mmdrop() mm_pasid_drop() After iommu_domain_free() returns, accessing domain->mm->iommu_mm may dereference a freed mm structure, leading to a crash. Fix this by moving the code that accesses domain->mm->iommu_mm to before the call to iommu_domain_free().

Affected Packages3 packages

Debianlinux/linux_kernel< 6.19.10-1
CVEListV5linux/linux9f0a7ab700f8620e433b05c57fbd26c92ea186d958abeb7b9562f25bdfa2f5ae5ce803eb02e74433+3
debiandebian/linux< linux 6.19.10-1 (forky)

🔴Vulnerability Details

2
GHSA
GHSA-742c-798h-fpj3: In the Linux kernel, the following vulnerability has been resolved: iommu/sva: Fix crash in iommu_sva_unbind_device() domain->mm->iommu_mm can be fr2026-04-03
OSV
CVE-2026-23429: In the Linux kernel, the following vulnerability has been resolved: iommu/sva: Fix crash in iommu_sva_unbind_device() domain->mm->iommu_mm can be free2026-04-03

📋Vendor Advisories

2
Red Hat
kernel: iommu/sva: Fix crash in iommu_sva_unbind_device()2026-04-03
Debian
CVE-2026-23429: linux - In the Linux kernel, the following vulnerability has been resolved: iommu/sva: ...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-23429 Impact, Exploitability, and Mitigation Steps | Wiz