CVE-2026-23225

Source
https://cve.org/CVERecord?id=CVE-2026-23225
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-23225.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2026-23225
Downstream
Published
2026-02-18T14:53:28.387Z
Modified
2026-02-23T21:08:22.257483Z
Summary
sched/mmcid: Don't assume CID is CPU owned on mode switch
Details

In the Linux kernel, the following vulnerability has been resolved:

sched/mmcid: Don't assume CID is CPU owned on mode switch

Shinichiro reported a KASAN UAF, which is actually an out of bounds access in the MMCID management code.

CPU0 CPU1 T1 runs in userspace T0: fork(T4) -> Switch to per CPU CID mode fixup() set MMCIDTRANSIT on T1/CPU1 T4 exit() T3 exit() T2 exit() T1 exit() switch to per task mode ---> Out of bounds access.

As T1 has not scheduled after T0 set the TRANSIT bit, it exits with the TRANSIT bit set. schedmmcidremoveuser() clears the TRANSIT bit in the task and drops the CID, but it does not touch the per CPU storage. That's functionally correct because a CID is only owned by the CPU when the ONCPU bit is set, which is mutually exclusive with the TRANSIT flag.

Now schedmmcidexit() assumes that the CID is CPU owned because the prior mode was per CPU. It invokes mmdropcidoncpu() which clears the not set ONCPU bit and then invokes clearbit() with an insanely large bit number because TRANSIT is set (bit 29).

Prevent that by actually validating that the CID is CPU owned in mmdropcidoncpu().

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23225.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
007d84287c7466ca68a5809b616338214dc5b77b
Fixed
81f29975631db8a78651b3140ecd0f88ffafc476
Fixed
1e83ccd5921a610ef409a7d4e56db27822b4ea39

Affected versions

v6.*
v6.19

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-23225.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.19.0
Fixed
6.19.1

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-23225.json"