CVE-2026-23215

CWE-1318 documents8 sources
Severity
5.5MEDIUM
EPSS
0.0%
top 96.99%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 18

Description

In the Linux kernel, the following vulnerability has been resolved: x86/vmware: Fix hypercall clobbers Fedora QA reported the following panic: BUG: unable to handle page fault for address: 0000000040003e54 #PF: supervisor write access in kernel mode #PF: error_code(0x0002) - not-present page Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS edk2-20251119-3.fc43 11/19/2025 RIP: 0010:vmware_hypercall4.constprop.0+0x52/0x90 .. Call Trace: vmmouse_report_events+0x13e/0x1b0 psmouse_handle_b

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages3 packages

NVDlinux/linux_kernel6.116.12.70+2
CVEListV5linux/linux34bf25e820ae1ab38f9cd88834843ba76678a2fd2f467a92df61eb516a4ec36ee16234dd4e5ccf00+3
Debianlinux< 6.12.73-1+1

Patches

🔴Vulnerability Details

3
GHSA
GHSA-g5pw-hppv-79r6: In the Linux kernel, the following vulnerability has been resolved: x86/vmware: Fix hypercall clobbers Fedora QA reported the following panic: BUG:2026-02-18
OSV
CVE-2026-23215: In the Linux kernel, the following vulnerability has been resolved: x86/vmware: Fix hypercall clobbers Fedora QA reported the following panic: BUG: un2026-02-18
CVEList
x86/vmware: Fix hypercall clobbers2026-02-18

📋Vendor Advisories

3
Red Hat
kernel: x86/vmware: Fix hypercall clobbers2026-02-18
Microsoft
x86/vmware: Fix hypercall clobbers2026-02-10
Debian
CVE-2026-23215: linux - In the Linux kernel, the following vulnerability has been resolved: x86/vmware:...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-23215 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-23215 (MEDIUM CVSS 5.5) | In the Linux kernel | cvebase.io