The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-23435

CVE-2026-23435: Linux Kernel Use-After-Free Vulnerability

CVE-2026-23435 is a use-after-free flaw in the Linux kernel's perf/x86 subsystem that causes NULL pointer dereference crashes in the PMU NMI handler. This article covers technical details, affected systems, and mitigation.

Published: April 10, 2026

CVE-2026-23435 Overview

A NULL pointer dereference vulnerability has been identified in the Linux kernel's Performance Monitoring Unit (PMU) subsystem for x86 architecture. The vulnerability exists in the x86_pmu_enable() function where improper event pointer setup can lead to a system crash when the PMU NMI handler attempts to access an uninitialized event pointer. This issue specifically affects AMD EPYC systems running performance monitoring workloads and can result in a complete system crash (kernel panic).

Critical Impact

Production AMD EPYC systems may experience kernel panics and complete system crashes when performance monitoring events are throttled and then unthrottled during normal operation, potentially causing significant service disruption.

Affected Products

  • Linux kernel with perf/x86 PMU subsystem (AMD EPYC systems)
  • Systems using AMD PMU v2 interrupt handler (amd_pmu_v2_handle_irq)
  • Linux kernel versions prior to the security patch

Discovery Timeline

  • 2026-04-03 - CVE CVE-2026-23435 published to NVD
  • 2026-04-07 - Last updated in NVD database

Technical Details for CVE-2026-23435

Vulnerability Analysis

This vulnerability is a NULL pointer dereference that occurs in the Linux kernel's x86 PMU (Performance Monitoring Unit) subsystem. The flaw manifests during a specific race condition sequence involving performance event throttling and rescheduling. When a group of perf events overflows, the kernel triggers a group throttle via perf_event_throttle_group(), stopping all events and clearing the active_mask bits while preserving the events[] array.

The root issue stems from commit 7e772a93eb61 which moved the cpuc->events[idx] assignment out of x86_pmu_start() and into step 2 of x86_pmu_enable(), after the PERF_HES_ARCH check. This change inadvertently broke any code path that calls pmu->start() without going through x86_pmu_enable() — specifically the unthrottle path.

During the crash, drgn inspection of the vmcore revealed a critical mismatch between cpuc->active_mask and cpuc->events[]: bit 2 of active_mask was set (value 0x1e indicating bits 1, 2, 3, 4), but events[2] was NULL while the other event pointers were valid. This state inconsistency directly led to the NULL pointer dereference when the NMI handler attempted to process the active counter.

Root Cause

The vulnerability originates from the code reorganization in commit 7e772a93eb61 ("perf/x86: Fix NULL event access and potential PEBS record loss"). This commit moved the cpuc->events[hwc->idx] assignment to occur after the PERF_HES_ARCH check in x86_pmu_enable(). When stopped events need to move counters, they receive the PERF_HES_ARCH flag and events[old_idx] is cleared, but in step 2 of x86_pmu_enable(), PERF_HES_ARCH causes these events to be skipped, meaning events[new_idx] is never populated.

Attack Vector

The vulnerability is triggered through a race condition sequence during normal system operation:

  1. A group of perf events overflows, triggering group throttle via perf_event_throttle_group(). All events are stopped with active_mask bits cleared.

  2. While still throttled (PERF_HES_STOPPED), x86_pmu_enable() runs due to other scheduling activity. Stopped events that need to move counters get PERF_HES_ARCH set and events[old_idx] cleared, but events[new_idx] is never set due to the PERF_HES_ARCH skip condition.

  3. The timer tick unthrottles the group via pmu->start(). Since the events[] assignment was removed from x86_pmu_start(), active_mask[new_idx] is set but events[new_idx] remains NULL.

  4. A PMC overflow NMI fires. The handler iterates active counters, finds active_mask[2] set, reads events[2] which is NULL, and crashes when dereferencing it in x86_perf_event_update() at the if (unlikely(!hwc->event_base)) check.

The kernel crash manifests with the following signature:

BUG: kernel NULL pointer dereference, address: 0000000000000198
RIP: x86_perf_event_update+0xc/0xa0
Call Trace:
<NMI>
amd_pmu_v2_handle_irq+0x1a6/0x390
perf_event_nmi_handler+0x24/0x40

Detection Methods for CVE-2026-23435

Indicators of Compromise

  • Kernel panic messages containing NULL pointer dereference at address 0x0000000000000198
  • Stack traces showing x86_perf_event_update, amd_pmu_v2_handle_irq, and perf_event_nmi_handler functions
  • System crashes occurring during heavy performance monitoring workloads on AMD EPYC systems
  • Kernel logs showing NMI handler failures related to PMU events

Detection Strategies

  • Monitor /var/log/kern.log and dmesg output for NULL pointer dereference errors in perf subsystem functions
  • Deploy kernel crash dump analysis tools (kdump/crash) to capture and analyze vmcore files for evidence of cpuc->events[] and active_mask mismatches
  • Implement automated log monitoring for patterns matching x86_perf_event_update and BUG: kernel NULL pointer dereference

Monitoring Recommendations

  • Enable kernel crash dumps via kdump to capture diagnostic information when crashes occur
  • Configure syslog alerting for kernel panic patterns related to perf/x86 subsystem
  • Monitor system uptime and unexpected reboots on AMD EPYC systems with active performance monitoring

How to Mitigate CVE-2026-23435

Immediate Actions Required

  • Review kernel version and determine if vulnerable code paths are present
  • Consider temporarily disabling or reducing performance monitoring event collection on affected AMD EPYC production systems until patched
  • Schedule maintenance windows for kernel updates on critical infrastructure
  • Prepare for kernel updates by testing patches in staging environments first

Patch Information

The Linux kernel maintainers have resolved this vulnerability by moving the cpuc->events[hwc->idx] assignment in x86_pmu_enable() to occur before the PERF_HES_ARCH check. This ensures that events[] is populated even for events that are not immediately started, guaranteeing that the unthrottle path via pmu->start() always finds a valid event pointer.

Patches are available through the following kernel.org commits:

  • Kernel.org Commit 886fa86
  • Kernel.org Commit 8d5fae6
  • Kernel.org Commit c1dd1e2

Workarounds

  • Reduce the frequency of performance monitoring event collection to minimize throttle/unthrottle cycles
  • Limit the number of concurrent perf events running on affected systems
  • If possible, avoid running performance monitoring workloads that frequently trigger event throttling
  • Consider using alternative monitoring approaches that don't rely on hardware PMU counters until patching is complete
bash
# Check current kernel version for vulnerability assessment
uname -r

# Review kernel logs for signs of PMU-related issues
dmesg | grep -E "(perf|pmu|x86_perf_event_update)"

# Verify if AMD EPYC PMU v2 handler is in use
grep -r "amd_pmu" /proc/kallsyms 2>/dev/null | head -5

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeUse After Free

  • Vendor/TechLinux Kernel

  • SeverityNONE

  • CVSS ScoreN/A

  • EPSS Probability0.02%

  • Known ExploitedNo
  • Impact Assessment
  • ConfidentialityNone
  • IntegrityNone
  • AvailabilityNone
  • Technical References
  • Kernel.org Commit 886fa86

  • Kernel.org Commit 8d5fae6

  • Kernel.org Commit c1dd1e2
  • Related CVEs
  • CVE-2026-23462: Linux Kernel Use-After-Free Vulnerability

  • CVE-2026-23458: Linux Kernel Use-After-Free Vulnerability

  • CVE-2026-23456: Linux Kernel Use-After-Free Vulnerability

  • CVE-2026-23445: Linux Kernel Use-After-Free Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English