CVE-2026-23271
Received Received - Intake
Race Condition in Linux Kernel perf Event Overflow Handling

Publication date: 2026-03-20

Last updated on: 2026-04-02

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: perf: Fix __perf_event_overflow() vs perf_remove_from_context() race Make sure that __perf_event_overflow() runs with IRQs disabled for all possible callchains. Specifically the software events can end up running it with only preemption disabled. This opens up a race vs perf_event_exit_event() and friends that will go and free various things the overflow path expects to be present, like the BPF program.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-20
Last Modified
2026-04-02
Generated
2026-05-07
AI Q&A
2026-03-20
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
linux linux_kernel *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the Linux kernel's perf subsystem. It involves a race condition between the __perf_event_overflow() function and perf_remove_from_context() (and related functions). Specifically, __perf_event_overflow() may run with interrupts disabled only in some callchains, but in others it runs with only preemption disabled. This inconsistency can cause a race condition with perf_event_exit_event() and similar functions that free resources expected to be present during the overflow path, such as the BPF program.


How can this vulnerability impact me? :

The race condition can lead to use-after-free or other memory corruption issues within the perf subsystem of the Linux kernel. This could potentially cause system instability, crashes, or unexpected behavior when performance events are being handled. It may also affect the reliability of BPF programs that rely on these events.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

I don't know


What immediate steps should I take to mitigate this vulnerability?

I don't know


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart