Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2026-23271

Опубликовано: 20 мар. 2026
Источник: redhat
CVSS3: 5.8

Описание

In the Linux kernel, the following vulnerability has been resolved: perf: Fix __perf_event_overflow() vs perf_remove_from_context() race Make sure that __perf_event_overflow() runs with IRQs disabled for all possible callchains. Specifically the software events can end up running it with only preemption disabled. This opens up a race vs perf_event_exit_event() and friends that will go and free various things the overflow path expects to be present, like the BPF program.

A flaw was found in the Linux kernel's perf subsystem. A race condition exists between the __perf_event_overflow() function and functions like perf_remove_from_context() or perf_event_exit_event(). This occurs because __perf_event_overflow() may execute with only preemption disabled, allowing other operations to free resources, such as BPF (Berkeley Packet Filter) programs, that the overflow path expects to be available. This could lead to system instability or a denial of service.

Отчет

A race exists in the perf software event overflow handling where __perf_event_overflow can run without IRQs disabled for some callchains. This allows perf_event_release_kernel and perf_remove_from_context to free objects that the overflow path still expects to be present such as an attached BPF program. This is a classic lifetime bug and can result in use after free behavior which may manifest as a kernel crash. The issue is not network reachable and it requires local execution that can trigger perf overflow paths such as software events tracepoints or timer based sampling. Impact is denial of service. A conservative worst case includes limited confidentiality and integrity impact due to the use after free class but reliable privilege escalation is not demonstrated by the patch context.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10kernelFix deferred
Red Hat Enterprise Linux 6kernelOut of support scope
Red Hat Enterprise Linux 7kernelFix deferred
Red Hat Enterprise Linux 7kernel-rtFix deferred
Red Hat Enterprise Linux 8kernelFix deferred
Red Hat Enterprise Linux 8kernel-rtFix deferred
Red Hat Enterprise Linux 9kernelFix deferred
Red Hat Enterprise Linux 9kernel-rtFix deferred

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-672
https://bugzilla.redhat.com/show_bug.cgi?id=2449565kernel: perf: Fix __perf_event_overflow() vs perf_remove_from_context() race

5.8 Medium

CVSS3

Связанные уязвимости

ubuntu
14 дней назад

In the Linux kernel, the following vulnerability has been resolved: perf: Fix __perf_event_overflow() vs perf_remove_from_context() race Make sure that __perf_event_overflow() runs with IRQs disabled for all possible callchains. Specifically the software events can end up running it with only preemption disabled. This opens up a race vs perf_event_exit_event() and friends that will go and free various things the overflow path expects to be present, like the BPF program.

nvd
14 дней назад

In the Linux kernel, the following vulnerability has been resolved: perf: Fix __perf_event_overflow() vs perf_remove_from_context() race Make sure that __perf_event_overflow() runs with IRQs disabled for all possible callchains. Specifically the software events can end up running it with only preemption disabled. This opens up a race vs perf_event_exit_event() and friends that will go and free various things the overflow path expects to be present, like the BPF program.

CVSS3: 5.5
msrc
13 дней назад

perf: Fix __perf_event_overflow() vs perf_remove_from_context() race

debian
14 дней назад

In the Linux kernel, the following vulnerability has been resolved: p ...

CVSS3: 7.8
github
14 дней назад

In the Linux kernel, the following vulnerability has been resolved: perf: Fix __perf_event_overflow() vs perf_remove_from_context() race Make sure that __perf_event_overflow() runs with IRQs disabled for all possible callchains. Specifically the software events can end up running it with only preemption disabled. This opens up a race vs perf_event_exit_event() and friends that will go and free various things the overflow path expects to be present, like the BPF program.

5.8 Medium

CVSS3