CVE-2026-23416Expired Pointer Dereference in Linux

Severity
6.9MEDIUM
No vector
EPSS
0.0%
top 99.08%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 2
Latest updateApr 3

Description

In the Linux kernel, the following vulnerability has been resolved: mm/mseal: update VMA end correctly on merge Previously we stored the end of the current VMA in curr_end, and then upon iterating to the next VMA updated curr_start to curr_end to advance to the next VMA. However, this doesn't take into account the fact that a VMA might be updated due to a merge by vma_modify_flags(), which can result in curr_end being stale and thus, upon setting curr_start to curr_end, ending up with an inco

Affected Packages2 packages

CVEListV5linux/linux6c2da14ae1e0a0146587381594559027bd46c05940b3f4700e5535fbe74738cebb9379a40ec66bed+3
debiandebian/linux< linux 6.19.11-1 (sid)

🔴Vulnerability Details

3
OSV
CVE-2026-23416: (In the Linux kernel, the following vulnerability has been resolved: m2026-04-03
OSV
CVE-2026-23416: In the Linux kernel, the following vulnerability has been resolved: mm/mseal: update VMA end correctly on merge Previously we stored the end of the cu2026-04-02
GHSA
GHSA-h9cv-r6cj-w8vj: In the Linux kernel, the following vulnerability has been resolved: mm/mseal: update VMA end correctly on merge Previously we stored the end of the2026-04-02

📋Vendor Advisories

2
Red Hat
kernel: mm/mseal: update VMA end correctly on merge2026-04-02
Debian
CVE-2026-23416: linux - In the Linux kernel, the following vulnerability has been resolved: mm/mseal: u...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-23416 Impact, Exploitability, and Mitigation Steps | Wiz