CVE-2026-23025
BaseFortify
Publication date: 2026-01-31
Last updated on: 2026-03-25
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.2 |
| linux | linux_kernel | From 6.13 (inc) to 6.18.7 (exc) |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | From 6.7 (inc) to 6.12.67 (exc) |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | From 6.1.57 (inc) to 6.1.162 (exc) |
| linux | linux_kernel | From 6.2.1 (inc) to 6.6.122 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel involves a race condition and potential corruption in the per-CPU page allocator (pcp) locking mechanism when running with SMP disabled (SMP=n). Specifically, the issue arises because the spin_trylock() function is assumed to always succeed in this configuration, but under certain interrupt conditions, it can fail, leading to corruption of the pcp structure. The problem was introduced by a change that left IRQs enabled during per-CPU page allocations, which allowed an interrupt to attempt to acquire a lock already held, causing a spinlock trylock failure and potential data corruption.
How can this vulnerability impact me? :
This vulnerability can cause corruption of the per-CPU page allocator data structures in the Linux kernel, potentially leading to system instability, crashes, or unpredictable behavior due to improper memory management. It may manifest as kernel bugs or failures related to spinlock handling and memory page allocation.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by observing kernel logs for specific spinlock trylock failures. Look for messages similar to: 'BUG: spinlock trylock failure on UP on CPU#0, kcompactd0/28 lock: 0xffff888807e35ef0, .magic: dead4ead'. You can check the kernel log using the command: dmesg | grep 'spinlock trylock failure'. Monitoring for these error messages indicates the presence of the vulnerability.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves updating the Linux kernel to a version where this vulnerability is fixed. The fix includes changing spin_lock() calls to spin_lock_irqsave() wrappers for SMP=n configurations to prevent pcp corruption. Until the kernel is updated, monitoring kernel logs for the described spinlock failures and avoiding configurations with SMP=n or disabling IRQs during per-cpu page allocations may reduce the risk.