CVE-2026-23435Signal Handler Race Condition in Linux

Severity
N/A
No vector
EPSS
0.0%
top 94.14%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 3

Description

In the Linux kernel, the following vulnerability has been resolved: perf/x86: Move event pointer setup earlier in x86_pmu_enable() A production AMD EPYC system crashed with a NULL pointer dereference in the PMU NMI handler: BUG: kernel NULL pointer dereference, address: 0000000000000198 RIP: x86_perf_event_update+0xc/0xa0 Call Trace: amd_pmu_v2_handle_irq+0x1a6/0x390 perf_event_nmi_handler+0x24/0x40 The faulting instruction is `cmpq $0x0, 0x198(%rdi)` with RDI=0, corresponding to the `if (u

Affected Packages3 packages

Debianlinux/linux_kernel< 6.19.10-1
CVEListV5linux/linux6b089028bff1f2ff9e0c62b8f1faca1a620e5d6e886fa869153917d902784098922defa20c3a2fe5+4
debiandebian/linux< linux 6.19.10-1 (forky)

🔴Vulnerability Details

2
OSV
CVE-2026-23435: In the Linux kernel, the following vulnerability has been resolved: perf/x86: Move event pointer setup earlier in x86_pmu_enable() A production AMD EP2026-04-03
GHSA
GHSA-4rrh-p933-rf74: In the Linux kernel, the following vulnerability has been resolved: perf/x86: Move event pointer setup earlier in x86_pmu_enable() A production AMD2026-04-03

📋Vendor Advisories

2
Red Hat
kernel: perf/x86: Move event pointer setup earlier in x86_pmu_enable()2026-04-03
Debian
CVE-2026-23435: linux - In the Linux kernel, the following vulnerability has been resolved: perf/x86: M...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-23435 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-23435 — Signal Handler Race Condition in Linux | cvebase