CVE-2026-23432Release of Invalid Pointer or Reference in Linux

Severity
5.3MEDIUM
No vector
EPSS
0.0%
top 93.48%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 3

Description

In the Linux kernel, the following vulnerability has been resolved: mshv: Fix use-after-free in mshv_map_user_memory error path In the error path of mshv_map_user_memory(), calling vfree() directly on the region leaves the MMU notifier registered. When userspace later unmaps the memory, the notifier fires and accesses the freed region, causing a use-after-free and potential kernel panic. Replace vfree() with mshv_partition_put() to properly unregister the MMU notifier before freeing the regio

Affected Packages2 packages

Debianlinux/linux_kernel< 6.19.10-1
CVEListV5linux/linuxb9a66cd5ccbb9fade15d0e427e19470d8ad35b7534861bdc0c0196b6c2dd48f7454029407704ff6e+2

🔴Vulnerability Details

3
GHSA
GHSA-cxhx-54f3-q38v: In the Linux kernel, the following vulnerability has been resolved: mshv: Fix use-after-free in mshv_map_user_memory error path In the error path of2026-04-03
CVEList
mshv: Fix use-after-free in mshv_map_user_memory error path2026-04-03
OSV
CVE-2026-23432: In the Linux kernel, the following vulnerability has been resolved: mshv: Fix use-after-free in mshv_map_user_memory error path In the error path of m2026-04-03

📋Vendor Advisories

2
Red Hat
kernel: mshv: Fix use-after-free in mshv_map_user_memory error path2026-04-03
Debian
CVE-2026-23432: linux - In the Linux kernel, the following vulnerability has been resolved: mshv: Fix u...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-23432 Impact, Exploitability, and Mitigation Steps | Wiz