#VU124178 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in Linux kernel - CVE-2026-23271

 

#VU124178 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in Linux kernel - CVE-2026-23271

Published: March 20, 2026


Vulnerability identifier: #VU124178
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2026-23271
CWE-ID: CWE-362
Exploitation vector: Local access
Exploit availability: No public exploit available
Vulnerable software:
Linux kernel
Software vendor:
Linux Foundation

Description

The vulnerability allows a local user to execute arbitrary code, escalate privileges, and cause a denial of service.

The vulnerability exists due to a race condition in the perf subsystem when handling performance events. A local user can trigger a use-after-free condition during event overflow processing to execute arbitrary code, escalate privileges, and cause a denial of service.

The issue arises from improper synchronization between __perf_event_overflow() and perf_remove_from_context(), where the overflow handler may access memory after it has been freed by context removal routines. The attacker must be able to create and manipulate perf events, which typically requires low-privileged user access to the perf subsystem.


Remediation

Install security update from vendor's repository.

External links