Impact
This vulnerability occurs when a high‑resolution timer used by the perf subsystem is not fully canceled before its associated perf event is freed. As a result, the timer may remain active, potentially allowing the kernel to execute timer callbacks with invalid state information once the event resources have been released. This can lead to unpredictable kernel behavior, such as data corruption, crashes, or instability, although no direct data‑exfiltration or privilege escalation is described.
Affected Systems
All versions of the Linux kernel from 6.18 onward, including the 6.19 release candidates 1 through 8, are affected. Kernel builds that lack the recent hrtimer_cancel fix for perf events are vulnerable.
Risk and Exploitability
The CVSS score of 7.8 indicates a high severity. The EPSS score of less than 1% suggests a very low likelihood of automated exploitation at present, and the vulnerability is not listed in CISA's KEV catalog. The description does not specify whether a local or elevated privilege is required; the likely attack vector is local execution, as it involves interacting with kernel perf events; however, this remains an inference.
OpenCVE Enrichment