CVE-2026-23429
Published: 03 April 2026
Summary
CVE-2026-23429 is a high-severity an unspecified weakness vulnerability in Linux Linux Kernel. Its CVSS base score is 7.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 3.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-2 (Flaw Remediation) and RA-5 (Vulnerability Monitoring and Scanning).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates the use-after-free vulnerability by requiring timely identification, testing, and installation of kernel patches that reorder the problematic memory access.
Implements memory safeguards such as address space layout randomization and non-executable memory regions to hinder exploitation of kernel use-after-free conditions.
Enables vulnerability scanning and monitoring to identify the presence of this specific kernel IOMMU SVA CVE in deployed systems for prompt remediation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
UAF in kernel IOMMU enables local priv esc (T1068) or system crash DoS via exploitation (T1499.004).
NVD Description
In the Linux kernel, the following vulnerability has been resolved: iommu/sva: Fix crash in iommu_sva_unbind_device() domain->mm->iommu_mm can be freed by iommu_domain_free(): iommu_domain_free() mmdrop() __mmdrop() mm_pasid_drop() After iommu_domain_free() returns, accessing domain->mm->iommu_mm may dereference a freed mm structure, leading to a crash.…
more
Fix this by moving the code that accesses domain->mm->iommu_mm to before the call to iommu_domain_free().
Deeper analysisAI
CVE-2026-23429 is a use-after-free vulnerability in the Linux kernel's IOMMU Shared Virtual Addressing (SVA) subsystem, specifically within the iommu_sva_unbind_device() function. The issue arises because domain->mm->iommu_mm can be freed during iommu_domain_free(), which calls mmdrop(), __mmdrop(), and mm_pasid_drop(). Subsequent access to domain->mm->iommu_mm after this free operation results in dereferencing freed memory, leading to a kernel crash.
A local attacker with low privileges (PR:L) can exploit this vulnerability with low attack complexity and no user interaction required (AV:L/AC:L/UI:N/S:U). Successful exploitation yields high impacts across confidentiality, integrity, and availability (C:H/I:H/A:H), with a CVSS v3.1 base score of 7.8, potentially enabling denial of service via system crash or further compromise through the use-after-free condition.
Mitigation patches are available in Linux kernel stable trees via the following commits: https://git.kernel.org/stable/c/06e14c36e20b48171df13d51b89fe67c594ed07a, https://git.kernel.org/stable/c/58abeb7b9562f25bdfa2f5ae5ce803eb02e74433, and https://git.kernel.org/stable/c/f5daaa2c959d9f894fb5b1ab76da8612dd220a0d. These patches resolve the issue by moving the access to domain->mm->iommu_mm before the iommu_domain_free() call.
Details
- CWE(s)