CVE-2026-23375
THP Bypass on Linux Kernel Anonymous Inodes Causes Kernel Crash
Publication date: 2026-03-25
Last updated on: 2026-04-24
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.8 |
| linux | linux_kernel | From 6.19 (inc) to 6.19.7 (exc) |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | 7.0 |
| linux | linux_kernel | From 6.13 (inc) to 6.18.17 (exc) |
| linux | linux_kernel | From 6.8.1 (inc) to 6.12.78 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-617 | The product contains an assert() or similar statement that can be triggered by an attacker, which leads to an application exit or other behavior that is more severe than necessary. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's memory management related to Transparent Huge Pages (THP). Specifically, the function file_thp_enabled() incorrectly allows THP for files on anonymous inodes, such as guest_memfd and secretmem. These files are created in a way that they appear as read-only regular files, making them eligible for THP collapse even though they should not be.
Anonymous inodes never increment their write count through the normal file system open path, so they should be excluded from THP eligibility. Allowing THP on these files causes issues: for guest_memfd, it triggers warnings due to unsupported large folios; for secretmem, it can cause kernel crashes or confusing false memory failure reports.
The fix involves denying THP for all anonymous inode files by checking IS_ANON_FILE(inode) in the file_thp_enabled() function.
How can this vulnerability impact me? :
This vulnerability can lead to kernel warnings, crashes, and false memory failure reports when using certain types of anonymous inode files like guest_memfd and secretmem.
- For guest_memfd, it can cause warnings due to unsupported large folios in the page cache.
- For secretmem, it can cause kernel crashes due to failed memory operations or confusing false memory failure recovery messages.
Such instability can affect system reliability and may lead to unexpected behavior or downtime.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is resolved by denying Transparent Huge Pages (THP) for files on anonymous inodes by checking IS_ANON_FILE(inode) in file_thp_enabled().
To mitigate this vulnerability, ensure your Linux kernel is updated to a version that includes this fix where THP is denied for anonymous inode files.