Impact
A null pointer dereference occurs in the Linux kernel when the perf subsystem attempts to handle a PMU overflow after an unthrottle operation. The bug originates from moving the assignment of event pointers out of the routine that starts the PMU, leaving the events array with a NULL entry that the crash handler later dereferences. The result is a kernel panic, cutting system operation.
Affected Systems
The vulnerability affects the Linux kernel in all releases that contain the faulty commit before it was corrected. Both standard Linux distributions and custom builds that have not yet applied the patch are susceptible.
Risk and Exploitability
The flaw is a local kernel pointer dereference (CWE‑364) with exploitation requiring privileged or local code execution. An attacker could trigger a denial‑of‑service by inducing a perf event group overflow and then unthrottling, but the probability of successful exploitation is low (EPSS < 1 %) and the vulnerability is not listed in the CISA KEV catalog.
OpenCVE Enrichment