Impact
The Linux kernel contains a flaw where a high‑resolution timer used by perf events can remain active when the event is freed. Because the timer is not fully cancelled, freeing the event can trigger a use‑after‑free condition that may corrupt kernel memory and destabilize the system. That is the primary impact of this vulnerability.
Affected Systems
All Linux kernels from version 6.18 and all 6.19 release candidates 1 through 8 are affected.
Risk and Exploitability
The CVSS score of 5.5 indicates a moderate severity, and the EPSS score of less than 1% shows a very low probability of automated exploitation. This vulnerability is not listed in CISA’s KEV catalog. The description does not specify the required privilege level or attack vector, so the exact exploitation path remains unspecified. The available data does not confirm that local or elevated privileges are required, nor does it confirm that kernel corruption will always lead to privilege escalation or data exfiltration.
OpenCVE Enrichment