CVE-2026-23248

Source
https://cve.org/CVERecord?id=CVE-2026-23248
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23248.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-23248
Downstream
Published
2026-03-18T10:05:10.070Z
Modified
2026-04-02T13:12:17.709046Z
Summary
perf/core: Fix refcount bug and potential UAF in perf_mmap
Details

In the Linux kernel, the following vulnerability has been resolved:

perf/core: Fix refcount bug and potential UAF in perf_mmap

Syzkaller reported a refcountt: addition on 0; use-after-free warning in perfmmap.

The issue is caused by a race condition between a failing mmap() setup and a concurrent mmap() on a dependent event (e.g., using output redirection).

In perfmmap(), the ringbuffer (rb) is allocated and assigned to event->rb with the mmapmutex held. The mutex is then released to perform maprange().

If maprange() fails, perfmmap_close() is called to clean up. However, since the mutex was dropped, another thread attaching to this event (via inherited events or output redirection) can acquire the mutex, observe the valid event->rb pointer, and attempt to increment its reference count. If the cleanup path has already dropped the reference count to zero, this results in a use-after-free or refcount saturation warning.

Fix this by extending the scope of mmapmutex to cover the maprange() call. This ensures that the ring buffer initialization and mapping (or cleanup on failure) happens atomically effectively, preventing other threads from accessing a half-initialized or dying ring buffer.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23248.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
b709eb872e19a19607bbb6d2975bc264d59735cf
Fixed
c27dea9f50ed525facb62ef647dddc4722456e07
Fixed
ac7ecb65af170a7fc193e7bd8be15dac84ec6a56
Fixed
77de62ad3de3967818c3dbe656b7336ebee461d2

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23248.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.14.0
Fixed
6.18.17
Type
ECOSYSTEM
Events
Introduced
6.19.0
Fixed
6.19.7

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23248.json"