CVE-2026-23088
Use-After-Free Vulnerability in Linux Kernel Tracing Causes Crash
Publication date: 2026-02-04
Last updated on: 2026-03-17
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.10.237 (inc) to 5.11 (exc) |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | From 6.7 (inc) to 6.12.68 (exc) |
| linux | linux_kernel | From 6.13 (inc) to 6.18.8 (exc) |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | From 5.15.124 (inc) to 5.16 (exc) |
| linux | linux_kernel | From 6.1.43 (inc) to 6.2 (exc) |
| linux | linux_kernel | From 6.3 (inc) to 6.6.122 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-476 | The product dereferences a pointer that it expects to be valid but is NULL. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's tracing subsystem when creating synthetic events based on existing synthetic events that include a stacktrace field. Specifically, if a new synthetic event uses the stacktrace field from an existing synthetic event, it causes a kernel crash.
The root cause is that the stacktrace field is not properly labeled as a dynamic event field but is instead treated as a normal field. This leads to incorrect handling in the kernel code, where metadata is retrieved instead of the actual dynamic array data, resulting in a page fault and kernel crash.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash when certain synthetic tracing events involving stacktraces are enabled or used. A kernel crash can lead to system instability, downtime, and potential loss of data or service availability.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by attempting to create and enable specific synthetic trace events in the Linux kernel tracing subsystem that involve stacktrace fields. The commands below demonstrate how to reproduce the conditions that trigger the kernel crash caused by this vulnerability:
- cd /sys/kernel/tracing
- echo 's:stack unsigned long stack[];' > dynamic_events
- echo 'hist:keys=prev_pid:s0=common_stacktrace if prev_state & 3' >> events/sched/sched_switch/trigger
- echo 'hist:keys=next_pid:s1=$s0:onmatch(sched.sched_switch).trace(stack,$s1)' >> events/sched/sched_switch/trigger
- echo 's:syscall_stack s64 id; unsigned long stack[];' >> dynamic_events
- echo 'hist:keys=common_pid:s2=stack' >> events/synthetic/stack/trigger
- echo 'hist:keys=common_pid:s3=$s2,i0=id:onmatch(synthetic.stack).trace(syscall_stack,$i0,$s3)' >> events/raw_syscalls/sys_exit/trigger
- echo 1 > events/synthetic/syscall_stack/enable
If enabling the synthetic event "syscall_stack" causes a kernel crash with a page fault error, this indicates the presence of the vulnerability.
What immediate steps should I take to mitigate this vulnerability?
I don't know