Impact
The vulnerability occurs in the Linux kernel’s perf subsystem when a user-space task is in the process of exiting. During this short window the task’s memory mapping field becomes null while certain flags still indicate a user task, causing the perf helper to dereference a null pointer and crash the kernel. This is a classic null pointer dereference (CWE-476) that can lead to system-wide denial of service by crashing the kernel.
Affected Systems
Any Linux kernel instance that has not incorporated the patch implementing the is_user_task() helper is affected, including kernel 6.19 releases and earlier versions that contain the older perf implementation. The CVE references cover the 6.19 release candidates (rc1 through rc7) and the stable kernel sources, indicating that vulnerable code is present in all pre-patch kernels for that major release.
Risk and Exploitability
The severity is moderate with a CVSS score of 5.5, and the EPSS score is less than 1%, suggesting that exploitation is unlikely. The exploitation requires a local user or privilege level sufficient to run the perf tool against a specific task during its exit, which is an inferred local attack vector. The vulnerability is not listed in the CISA KEV catalog, further indicating a low threat level for active exploitation.
OpenCVE Enrichment