๐Ÿ” CVE Alert

CVE-2026-23248

HIGH 7.8

perf/core: Fix refcount bug and potential UAF in perf_mmap

CVSS Score
7.8
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: perf/core: Fix refcount bug and potential UAF in perf_mmap Syzkaller reported a refcount_t: addition on 0; use-after-free warning in perf_mmap. The issue is caused by a race condition between a failing mmap() setup and a concurrent mmap() on a dependent event (e.g., using output redirection). In perf_mmap(), the ring_buffer (rb) is allocated and assigned to event->rb with the mmap_mutex held. The mutex is then released to perform map_range(). If map_range() fails, perf_mmap_close() is called to clean up. However, since the mutex was dropped, another thread attaching to this event (via inherited events or output redirection) can acquire the mutex, observe the valid event->rb pointer, and attempt to increment its reference count. If the cleanup path has already dropped the reference count to zero, this results in a use-after-free or refcount saturation warning. Fix this by extending the scope of mmap_mutex to cover the map_range() call. This ensures that the ring buffer initialization and mapping (or cleanup on failure) happens atomically effectively, preventing other threads from accessing a half-initialized or dying ring buffer.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Mar 18, 2026
Last Updated Apr 13, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new high vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

Linux / Linux
b709eb872e19a19607bbb6d2975bc264d59735cf < c27dea9f50ed525facb62ef647dddc4722456e07 b709eb872e19a19607bbb6d2975bc264d59735cf < ac7ecb65af170a7fc193e7bd8be15dac84ec6a56 b709eb872e19a19607bbb6d2975bc264d59735cf < 77de62ad3de3967818c3dbe656b7336ebee461d2
Linux / Linux
6.14

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/c27dea9f50ed525facb62ef647dddc4722456e07 git.kernel.org: https://git.kernel.org/stable/c/ac7ecb65af170a7fc193e7bd8be15dac84ec6a56 git.kernel.org: https://git.kernel.org/stable/c/77de62ad3de3967818c3dbe656b7336ebee461d2