Impact
The flaw lies in the Linux kernel's performance event scheduler. An invalid wait context can arise when a pinned event fails and the scheduler attempts to wake threads while holding a wait‑queue lock inside the perf‑context lock. This misuse of locking leads to a kernel panic and denial of service. The weakness is classified as CWE-413.
Affected Systems
The vulnerability affects any Linux kernel that contains the buggy perf/core implementation before the patch. The log excerpt indicates the issue appears in kernel 6.15.0-next-20250530-next. All Linux releases that have not yet applied the commit 486ff5ad49bc50315bcaf6d45f04a33ef0a45ced are potentially vulnerable. The vendor is the Linux kernel project.
Risk and Exploitability
The CVSS score of 5.5 signals moderate severity, while the EPSS score of less than 1 ‑ % denotes a low likelihood of exploitation in the wild. The vulnerability is not listed in the CISA KEV catalog, suggesting no public exploits are currently known. Attacking this flaw would likely require a local user or kernel module capable of creating a failing perf event; no clear remote exploitation path is documented.
OpenCVE Enrichment