PT-2026-26051 · Linux · Linux

Published

2026-03-18

·

Updated

2026-03-18

·

CVE-2026-23248

None

No severity ratings or metrics are available. When they are, we'll update the corresponding info on the page.
In the Linux kernel, the following vulnerability has been resolved:
perf/core: Fix refcount bug and potential UAF in perf mmap
Syzkaller reported a refcount t: addition on 0; use-after-free warning in perf mmap.
The issue is caused by a race condition between a failing mmap() setup and a concurrent mmap() on a dependent event (e.g., using output redirection).
In perf mmap(), the ring buffer (rb) is allocated and assigned to event->rb with the mmap mutex held. The mutex is then released to perform map range().
If map range() fails, perf mmap close() is called to clean up. However, since the mutex was dropped, another thread attaching to this event (via inherited events or output redirection) can acquire the mutex, observe the valid event->rb pointer, and attempt to increment its reference count. If the cleanup path has already dropped the reference count to zero, this results in a use-after-free or refcount saturation warning.
Fix this by extending the scope of mmap mutex to cover the map range() call. This ensures that the ring buffer initialization and mapping (or cleanup on failure) happens atomically effectively, preventing other threads from accessing a half-initialized or dying ring buffer.

Related Identifiers

CVE-2026-23248

Affected Products

Linux