Impact
When a KVM virtual machine releases an IRQFD, the kernel mistakenly overwrites the IRQFD’s copy of the IRQ routing entry. This clobbering causes architecture‑specific routines such as kvm_arch_irq_bypass_del_producer and kvm_irq_routing_update to work with stale or invalid data, leading to NULL pointer dereferences or list corruption that ultimately trigger a kernel panic. The host dump produced by the bug shows classic crashes in AMD ACPI code and AVIC updates, confirming that the flaw can take the entire virtualization host offline.
Affected Systems
Affected systems include any Linux kernel that contains the unpatched IRQFD handling code. The CPE entries show that the flaw exists in release‑candidate builds 6.19:rc1 through 6.19:rc8, and by implication the final 6.19.x kernel. The description references issues on the x86 and arm64 architectures, so both families are vulnerable unless the kernel has been updated.
Risk and Exploitability
The CVSS score of 7.8 indicates a high‑severity vulnerability, while the EPSS estimate of less than 1% reflects a very low current exploitation probability. The flaw is not listed in the CISA KEV catalog, suggesting limited active exploitation. Because triggering the deassignment of a KVM_IRQFD requires privileged or local access to the guest or host, the attack vector is inferred to be local privileged. A successful exploit would kill the kernel, offering a denial‑of‑service impact to all virtual machines on the host.
OpenCVE Enrichment
Debian DLA
Debian DSA