Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-23271— perf: Fix __perf_event_overflow() vs perf_remove_from_context() race

CVSS 7.8 · High EPSS 0.01% · P3
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-23271

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
perf: Fix __perf_event_overflow() vs perf_remove_from_context() race
Source: NVD (National Vulnerability Database)
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: perf: Fix __perf_event_overflow() vs perf_remove_from_context() race Make sure that __perf_event_overflow() runs with IRQs disabled for all possible callchains. Specifically the software events can end up running it with only preemption disabled. This opens up a race vs perf_event_exit_event() and friends that will go and free various things the overflow path expects to be present, like the BPF program.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于__perf_event_overflow与perf_remove_from_context之间的竞争条件,可能导致释放后重用问题。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
LinuxLinux 592903cdcbf606a838056bae6d03fc557806c914 ~ 4df1a45819e50993cb351682a6ae8e7ed2d233a0 -
LinuxLinux 2.6.31 -

II. Public POCs for CVE-2026-23271

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-23271

登录查看更多情报信息。

Same Patch Batch · Linux · 2026-03-20 · 8 CVEs total

CVE-2026-232787.8 HIGHnetfilter: nf_tables: always walk all pending catchall elements
CVE-2026-232757.8 HIGHio_uring: ensure ctx->rings is stable for task work flags manipulation
CVE-2026-232747.8 HIGHnetfilter: xt_IDLETIMER: reject rev0 reuse of ALARM timer labels
CVE-2026-232737.8 HIGHmacvlan: observe an RCU grace period in macvlan_common_newlink() error path
CVE-2026-232727.8 HIGHnetfilter: nf_tables: unconditionally bump set->nelems before insertion
CVE-2026-23276net: add xmit recursion limit to tunnel xmit functions
CVE-2026-23277net/sched: teql: fix NULL pointer dereference in iptunnel_xmit on TEQL slave xmit

IV. Related Vulnerabilities

V. Comments for CVE-2026-23271

No comments yet


Leave a comment