CVE-2026-23311Improper Resource Locking in Linux

Severity
5.5MEDIUM
No vector
EPSS
0.0%
top 94.13%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 25

Description

In the Linux kernel, the following vulnerability has been resolved: perf/core: Fix invalid wait context in ctx_sched_in() Lockdep found a bug in the event scheduling when a pinned event was failed and wakes up the threads in the ring buffer like below. It seems it should not grab a wait-queue lock under perf-context lock. Let's do it with irq_work. [ 39.913691] ============================= [ 39.914157] [ BUG: Invalid wait context ] [ 39.914623] 6.15.0-next-20250530-next-2025053 #1 Not taint

Affected Packages3 packages

Linuxlinux/linux_kernel6.15.06.18.17+1
Debianlinux/linux_kernel< 6.19.8-1
CVEListV5linux/linuxf4b07fd62d4d11d57a15cb4ae01b3833282eb8f6c67ab059953e3b66cb17ddd6524c23f9e1f6526d+3

🔴Vulnerability Details

4
GHSA
GHSA-h7wr-qv5c-937x: In the Linux kernel, the following vulnerability has been resolved: perf/core: Fix invalid wait context in ctx_sched_in() Lockdep found a bug in the2026-03-25
CVEList
perf/core: Fix invalid wait context in ctx_sched_in()2026-03-25
OSV
perf/core: Fix invalid wait context in ctx_sched_in()2026-03-25
OSV
CVE-2026-23311: In the Linux kernel, the following vulnerability has been resolved: perf/core: Fix invalid wait context in ctx_sched_in() Lockdep found a bug in the e2026-03-25

📋Vendor Advisories

2
Red Hat
kernel: perf/core: Fix invalid wait context in ctx_sched_in()2026-03-25
Debian
CVE-2026-23311: linux - In the Linux kernel, the following vulnerability has been resolved: perf/core: ...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-23311 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-23311 — Improper Resource Locking in Linux | cvebase