Impact
A defect in the Linux kernel's performance event subsystem triggers a refcount warning when a group leader "mmap" operation is followed by a group member "mmap" with the PERF_FLAG_FD_OUTPUT flag. The code increments the event->mmap_count counter from zero, which can lead to a use‑after‑free situation in the kernel. The patch prevents the counter from being incremented when it is zero, eliminating the warning and averting potential memory corruption or kernel instability.
Affected Systems
The issue exists in the Linux kernel, affecting all release candidate versions of 6.19 from rc1 through rc6 and any earlier kernels that had not yet incorporated the patch. The vulnerability is present in the kernel source itself, regardless of distribution, until the patch is applied.
Risk and Exploitability
With a CVSS score of 5.5 and an EPSS of less than 1 %, the probability of exploitation is low. The vulnerability is not catalogued in CISA’s KEV database. An attacker would need the capability to invoke perf_event_open, typically granted to privileged or CAP_PERFMON processes, making the attack vector local. The fix mitigates the risk by preventing a use‑after‑free that could lead to a kernel crash or instability.
OpenCVE Enrichment