CVE-2026-23102
Out-of-Bounds Memory Read in Linux arm64 SVE Signal Restore
Publication date: 2026-02-04
Last updated on: 2026-03-19
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | From 6.2 (inc) to 6.6.123 (exc) |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | From 5.19 (inc) to 6.1.162 (exc) |
| linux | linux_kernel | From 6.7 (inc) to 6.18.8 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-125 | The product reads data past the end, or before the beginning, of the intended buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's arm64/fpsimd signal handling related to the Scalable Vector Extension (SVE) context restoration when Scalable Matrix Extension (SME) is supported.
When restoring the SVE signal context, the kernel can incorrectly place a task into an invalid state where it may read from out-of-bounds memory or be killed with a SIGKILL signal.
Specifically, if the SVE signal context has the SVE_SIG_FLAG_SM flag set but the task's TIF_SME flag is clear, the kernel may read memory outside the allocated SVE state, potentially causing faults or task termination.
This situation can occur in unusual but legitimate cases, such as when the SVE context is modified by userspace or restored from another task's context.
Additionally, if the SVE_SIG_FLAG_SM flag is clear but the task's SVCR.SM bit was previously set, the task may be left in streaming mode unexpectedly, causing inconsistent register state.
The fix involves correctly setting or clearing the relevant flags and states during context restoration to prevent invalid states and out-of-bounds memory reads.
How can this vulnerability impact me? :
This vulnerability can impact a system by causing tasks to be placed into invalid states during signal context restoration, which may lead to out-of-bounds memory reads or the task being killed with a fatal SIGKILL.
Out-of-bounds memory reads could potentially expose unrelated data in memory, although the vulnerability notes that secret data loaded into registers is not exposed to userspace.
The unexpected killing of tasks can lead to application instability or crashes, especially in scenarios where SVE contexts are manipulated or restored across tasks.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
This vulnerability has been resolved in the Linux kernel by fixing the restoration of the SVE signal context when SME is supported. The fix involves setting TIF_SME when setting SVCR.SM and clearing SVCR.SM when restoring a SVE signal context with SVE_SIG_FLAG_SM clear.
To mitigate this vulnerability immediately, you should update your Linux kernel to a version that includes this fix.