CVE-2026-23014
Description
In the Linux kernel, the following vulnerability has been resolved:
perf: Ensure swevent hrtimer is properly destroyed
With the change to hrtimer_try_to_cancel() in perf_swevent_cancel_hrtimer() it appears possible for the hrtimer to still be active by the time the event gets freed.
Make sure the event does a full hrtimer_cancel() on the free path by installing a perf_event::destroy handler.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
In the Linux kernel, a use-after-free in perf swevent hrtimer can occur if the timer is not fully canceled before event free.
Vulnerability
CVE-2026-23014 is a use-after-free vulnerability in the Linux kernel's perf subsystem, specifically in the software event (swevent) hrtimer handling. The root cause is that perf_swevent_cancel_hrtimer() uses hrtimer_try_to_cancel(), which may not fully stop the hrtimer if it is already running. Consequently, the hrtimer can still be active when the associated perf event is freed, leading to a use-after-free condition [1].
Exploitation
To exploit this vulnerability, an attacker must be able to create and destroy perf events, typically requiring local access and the ability to invoke the perf_event_open system call. The attack surface is local, and no special privileges are needed beyond the ability to interact with the perf subsystem. The bug occurs during event destruction, making it a race condition that could be triggered by concurrent operations [2].
Impact
A successful exploit could allow an attacker with local access to escalate privileges or cause a denial of service (system crash) by corrupting kernel memory. The vulnerability is rated High with a CVSS score of 7.8, indicating significant impact on confidentiality, integrity, and availability.
Mitigation
The fix is implemented in the Linux kernel by adding a perf_event::destroy handler that performs a full hrtimer_cancel() to ensure the timer is completely stopped before the event is freed. Patched versions are available in stable kernel updates. Users should apply the latest kernel patches from their distribution.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
11cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*+ 9 more
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*range: >=6.17.8,<6.18
- cpe:2.3:o:linux:linux_kernel:6.18:-:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:6.19:rc1:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:6.19:rc2:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:6.19:rc3:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:6.19:rc4:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:6.19:rc5:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:6.19:rc6:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:6.19:rc7:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:6.19:rc8:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2News mentions
0No linked articles in our index yet.