CVE-2026-23311 — Improper Resource Locking in Linux
Severity
5.5MEDIUM
No vectorEPSS
0.0%
top 94.13%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 25
Description
In the Linux kernel, the following vulnerability has been resolved:
perf/core: Fix invalid wait context in ctx_sched_in()
Lockdep found a bug in the event scheduling when a pinned event was
failed and wakes up the threads in the ring buffer like below.
It seems it should not grab a wait-queue lock under perf-context lock.
Let's do it with irq_work.
[ 39.913691] =============================
[ 39.914157] [ BUG: Invalid wait context ]
[ 39.914623] 6.15.0-next-20250530-next-2025053 #1 Not taint…
Affected Packages3 packages
▶CVEListV5linux/linuxf4b07fd62d4d11d57a15cb4ae01b3833282eb8f6 — c67ab059953e3b66cb17ddd6524c23f9e1f6526d+3
🔴Vulnerability Details
4GHSA▶
GHSA-h7wr-qv5c-937x: In the Linux kernel, the following vulnerability has been resolved:
perf/core: Fix invalid wait context in ctx_sched_in()
Lockdep found a bug in the↗2026-03-25
OSV▶
CVE-2026-23311: In the Linux kernel, the following vulnerability has been resolved: perf/core: Fix invalid wait context in ctx_sched_in() Lockdep found a bug in the e↗2026-03-25