CVE-2026-23177
Infinite Loop Vulnerability in Linux Kernel shmem Swap Truncate
Publication date: 2026-02-14
Last updated on: 2026-02-14
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's memory management subsystem related to shared memory swap entries (shmem). Specifically, when truncating a large swap entry, the function shmem_free_swap() can enter an infinite loop under certain conditions. This happens if the truncation index points to the middle of a large swap entry that does not cross the end boundary. The function repeatedly fails to free the swap entry due to a base index check and retries with the same index, causing an infinite loop.
The issue arises because the code does not properly handle the scenario where the index points inside a large swap entry, leading to repeated retries without progress. The fix involves retrying with a rounded-down index and aborting if the index becomes smaller than the truncate range, preventing the infinite loop.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to enter an infinite loop during the truncation of large swap entries in shared memory. This infinite loop can lead to system instability or a hang, potentially causing denial of service by making the system unresponsive or consuming excessive CPU resources.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
I don't know