CVE-2026-23225
Out-of-Bounds Access in Linux Kernel MMCID Causes Potential Memory Corruption
Publication date: 2026-02-18
Last updated on: 2026-04-02
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an out of bounds access issue in the Linux kernel's MMCID management code related to CPU and task mode switching.
Specifically, when a task (T1) switches modes without being scheduled after a previous task (T0) set a TRANSIT bit, the system incorrectly assumes that a CPU ID (CID) is owned by the CPU. This leads to an invalid operation where a very large bit number is cleared, causing an out of bounds access.
The root cause is that the code does not properly validate whether the CID is actually CPU owned before performing certain operations, which results in a use-after-free (UAF) type error detected by KASAN.
How can this vulnerability impact me? :
This vulnerability can lead to memory corruption due to out of bounds access in kernel memory management.
Such memory corruption could potentially cause system instability, crashes, or unpredictable behavior in the Linux kernel.
In some cases, memory corruption vulnerabilities in the kernel can be exploited to escalate privileges or execute arbitrary code, though this specific impact is not detailed in the provided information.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
I don't know