CVE-2026-23225Out-of-bounds Write in Linux

Severity
7.8HIGHNVD
EPSS
0.0%
top 96.12%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedFeb 18

Description

In the Linux kernel, the following vulnerability has been resolved: sched/mmcid: Don't assume CID is CPU owned on mode switch Shinichiro reported a KASAN UAF, which is actually an out of bounds access in the MMCID management code. CPU0 CPU1 T1 runs in userspace T0: fork(T4) -> Switch to per CPU CID mode fixup() set MM_CID_TRANSIT on T1/CPU1 T4 exit() T3 exit() T2 exit() T1 exit() switch to per task mode ---> Out of bounds access. As T1 has not scheduled after T0 set the TRANSIT bit, it exits

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages2 packages

Linuxlinux/linux_kernel6.19.06.19.1
CVEListV5linux/linux007d84287c7466ca68a5809b616338214dc5b77b81f29975631db8a78651b3140ecd0f88ffafc476+2

🔴Vulnerability Details

4
OSV
sched/mmcid: Don't assume CID is CPU owned on mode switch2026-02-18
GHSA
GHSA-p525-h9pq-233r: In the Linux kernel, the following vulnerability has been resolved: sched/mmcid: Don't assume CID is CPU owned on mode switch Shinichiro reported a2026-02-18
OSV
CVE-2026-23225: In the Linux kernel, the following vulnerability has been resolved: sched/mmcid: Don't assume CID is CPU owned on mode switch Shinichiro reported a KA2026-02-18
CVEList
sched/mmcid: Don't assume CID is CPU owned on mode switch2026-02-18

📋Vendor Advisories

3
Red Hat
kernel: Kernel: Denial of Service and potential memory corruption via mmcid mode switch race condition2026-02-18
Microsoft
sched/mmcid: Don't assume CID is CPU owned on mode switch2026-02-10
Debian
CVE-2026-23225: linux - In the Linux kernel, the following vulnerability has been resolved: sched/mmcid...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-23225 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-23225 — Out-of-bounds Write in Linux | cvebase