CVE-2026-23215
Kernel Pointer Corruption in Linux x86 VMware Hypercall Causes Panic
Publication date: 2026-02-18
Last updated on: 2026-03-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | From 6.13 (inc) to 6.18.10 (exc) |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | From 6.11 (inc) to 6.12.70 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's x86 VMware mouse emulation driver (vmmouse). The issue arises because the QEMU VMware mouse emulation is buggy and clears the top 32 bits of the %rdi register, which the kernel uses to keep a pointer. Specifically, the vmmouse driver saves and restores register state using a 32-bit data array, which causes the high bits of the register to be cleared when restoring state.
As a result, a valid kernel stack address stored in %rdi loses its high bits after a VMware hypercall, leading to an invalid address and causing a page fault when the kernel tries to dereference it. The problem has been observed mainly with vmware_hypercall3() and vmware_hypercall4(). The fix involves marking the RDI and RSI registers as clobbered for these hypercalls to prevent the kernel from relying on their values across the calls.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to panic due to a page fault triggered by an invalid memory address dereference. This happens because the VMware mouse emulation driver incorrectly handles register state, leading to corrupted pointers.
The impact is primarily system instability or crashes when running Linux in virtualized environments using QEMU with VMware mouse emulation. This could disrupt normal operations and potentially cause data loss or service downtime.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
This vulnerability is caused by a bug in the QEMU VMware mouse emulation that clears the top 32 bits of the %rdi register, leading to a kernel panic due to a page fault.
The proper fix is in QEMU, but the kernel workaround marks the RDI/RSI registers as clobbered for the vmware_hypercall3() and vmware_hypercall4() calls to prevent the issue.
Immediate mitigation steps would involve updating the Linux kernel to a version that includes this fix to avoid the page fault and kernel panic.