CVE-2026-23211
Kernel Panic Due to Read-Only Swap Space in Linux Kernel
Publication date: 2026-02-18
Last updated on: 2026-03-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | From 6.18 (inc) to 6.18.9 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's memory management related to swap space handling. A recent change made the swap address space read-only, which can cause a kernel panic if the function arch_prepare_to_swap fails under heavy memory pressure. The panic occurs because the system tries to write to a read-only swap space, leading to a crash. The fix restores the swap address space to be writable to avoid this kernel panic.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to panic and crash under heavy memory pressure conditions. A kernel panic results in a system crash, which can lead to downtime, loss of unsaved data, and potential disruption of services running on the affected system.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is resolved by restoring the swap address space as not read-only to avoid kernel panic.
Therefore, immediate mitigation involves applying the patch or update that includes the commit 8b47299a411a which marks the swap address space correctly and adds context debug checks.