Impact
The vulnerability is a race condition in the Linux kernel's perf_mmap implementation. If a failing mmap() setup is interleaved with a concurrent mmap() on the same event, the ring buffer may be released while still referenced, leading to a use‑after‑free or refcount saturation condition. An attacker who can trigger perf events that are mapped concurrently could potentially exploit this flaw to corrupt kernel memory or cause an out‑of‑band crash, which may enable privilege escalation or denial of service.
Affected Systems
Affected systems are Linux kernel deployments; the specific kernel versions are not enumerated in the available information. The issue originates from the perf subsystem and is present in all builds that include the unpatched perf_mmap code path.
Risk and Exploitability
The CVSS score of 7.8 indicates a high severity, while the EPSS score of less than 1% implies a low likelihood of exploitation in the wild. The vulnerability has not been listed in the CISA KEV catalog. Exploitation would require local system access or the ability to create affinity to perf events, making the attack vector local or possibly privileged. Attackers would need to orchestrate the timing between failing and succeeding mmap calls, a non‑trivial requirement that reduces the risk compared to more easily exploitable flaws.
OpenCVE Enrichment