Impact
A bug in the Linux kernel scheduler occurs when it assumes a CPU‑owned CID during a mode switch, causing mm_drop_cid_on_cpu to clear a bit with an extremely large index. This results in an out-of-bounds write into per-CPU storage, which can corrupt kernel memory and provide a local attacker with the ability to gain elevated privileges or destabilize the system. The flaw represents a kernel-space use‑after‑free or buffer overflow weakness.
Affected Systems
Any Linux kernel build that contains the unpatched MMCID code is vulnerable. The advisory does not list specific releases, so all kernels prior to the commit that introduces the fix must be considered affected.
Risk and Exploitability
The CVSS score of 7.8 indicates high severity, while the EPSS score of less than 1% suggests a low likelihood of public exploitation at this time. The vulnerability resides in core scheduler logic, so exploitation would require local access to influence task scheduling or trigger the mode switch. The flaw is not currently listed in the CISA KEV catalog.
OpenCVE Enrichment