CVE-2026-23319

EUVD-2026-15269
In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix a UAF issue in bpf_trampoline_link_cgroup_shim

The root cause of this bug is that when 'bpf_link_put' reduces the
refcount of 'shim_link->link.link' to zero, the resource is considered
released but may still be referenced via 'tr->progs_hlist' in
'cgroup_shim_find'. The actual cleanup of 'tr->progs_hlist' in
'bpf_shim_tramp_link_release' is deferred. During this window, another
process can cause a use-after-free via 'bpf_trampoline_link_cgroup_shim'.

Based on Martin KaFai Lau's suggestions, I have created a simple patch.

To fix this:
   Add an atomic non-zero check in 'bpf_trampoline_link_cgroup_shim'.
   Only increment the refcount if it is not already zero.

Testing:
   I verified the fix by adding a delay in
   'bpf_shim_tramp_link_release' to make the bug easier to trigger:

static void bpf_shim_tramp_link_release(struct bpf_link *link)
{
	/* ... */
	if (!shim_link->trampoline)
		return;

+	msleep(100);
	WARN_ON_ONCE(bpf_trampoline_unlink_prog(&shim_link->link,
		shim_link->trampoline, NULL));
	bpf_trampoline_put(shim_link->trampoline);
}

Before the patch, running a PoC easily reproduced the crash(almost 100%)
with a call trace similar to KaiyanM's report.
After the patch, the bug no longer occurs even after millions of
iterations.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.8 HIGH
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 3%
Affected Products (NVD)
VendorProductVersion
linuxlinux_kernel
6.0.1 ≤
𝑥
< 6.1.167
linuxlinux_kernel
6.2 ≤
𝑥
< 6.6.130
linuxlinux_kernel
6.7 ≤
𝑥
< 6.12.77
linuxlinux_kernel
6.13 ≤
𝑥
< 6.18.17
linuxlinux_kernel
6.19 ≤
𝑥
< 6.19.7
linuxlinux_kernel
6.0
linuxlinux_kernel
7.0:rc1
linuxlinux_kernel
7.0:rc2
linuxlinux_kernel
7.0:rc3
linuxlinux_kernel
7.0:rc4
linuxlinux_kernel
7.0:rc5
linuxlinux_kernel
7.0:rc6
linuxlinux_kernel
7.0:rc7
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
linux
bookworm
vulnerable
bookworm (security)
6.1.170-3
fixed
bullseye
5.10.223-1
fixed
bullseye (security)
5.10.251-4
fixed
forky
7.0.4-1
fixed
sid
7.0.4-1
fixed
trixie
vulnerable
trixie (security)
6.12.86-1
fixed
linux-6.1
bullseye (security)
6.1.170-3~deb11u1
fixed
openSUSE logo
openSUSE / SLES Releases
openSUSE Product
Release
kernel-64kb
suse enterprise desktop 15 SP7
6.4.0-150700.53.37.1
fixed
suse enterprise sap 15 SP7
6.4.0-150700.53.37.1
fixed
suse enterprise server 15 SP7
6.4.0-150700.53.37.1
fixed
kernel-default
suse enterprise desktop 15 SP7
6.4.0-150700.53.37.1
fixed
suse enterprise sap 15 SP7
6.4.0-150700.53.37.1
fixed
suse enterprise server 15 SP7
6.4.0-150700.53.37.1
fixed
kernel-default-base
suse enterprise desktop 15 SP7
6.4.0-150700.53.37.1.150700.17.25.1
fixed
suse enterprise sap 15 SP7
6.4.0-150700.53.37.1.150700.17.25.1
fixed
suse enterprise server 15 SP7
6.4.0-150700.53.37.1.150700.17.25.1
fixed
kernel-docs
suse enterprise desktop 15 SP7
6.4.0-150700.53.37.1
fixed
suse enterprise sap 15 SP7
6.4.0-150700.53.37.1
fixed
suse enterprise server 15 SP7
6.4.0-150700.53.37.1
fixed
kernel-macros
suse enterprise desktop 15 SP7
6.4.0-150700.53.37.1
fixed
suse enterprise sap 15 SP7
6.4.0-150700.53.37.1
fixed
suse enterprise server 15 SP7
6.4.0-150700.53.37.1
fixed
kernel-obs-build
suse enterprise desktop 15 SP7
6.4.0-150700.53.37.1
fixed
suse enterprise sap 15 SP7
6.4.0-150700.53.37.1
fixed
suse enterprise server 15 SP7
6.4.0-150700.53.37.1
fixed
kernel-source
suse enterprise desktop 15 SP7
6.4.0-150700.53.37.1
fixed
suse enterprise sap 15 SP7
6.4.0-150700.53.37.1
fixed
suse enterprise server 15 SP7
6.4.0-150700.53.37.1
fixed
kernel-syms
suse enterprise desktop 15 SP7
6.4.0-150700.53.37.1
fixed
suse enterprise sap 15 SP7
6.4.0-150700.53.37.1
fixed
suse enterprise server 15 SP7
6.4.0-150700.53.37.1
fixed
kernel-zfcpdump
suse enterprise desktop 15 SP7
6.4.0-150700.53.37.1
fixed
suse enterprise sap 15 SP7
6.4.0-150700.53.37.1
fixed
suse enterprise server 15 SP7
6.4.0-150700.53.37.1
fixed