Impact
A kernel bug in the x86 performance‑monitoring unit causes a NULL pointer dereference when a hardware counter overflows during a non‑maskable interrupt routine. The fault triggers a BUG: kernel NULL pointer dereference and results in an immediate kernel crash, forcing the machine to reboot or become unresponsive. The underlying weakness is a NULL pointer dereference that allows an event structure to be accessed without proper initialization.
Affected Systems
Linux kernel builds for x86 architectures, particularly on AMD EPYC processors, are affected. The flaw exists in any kernel that has not incorporated commit 7e772a93eb61, which moves the event pointer assignment earlier in the PMU enable routine. Systems running such kernels will crash when a user or process creates or manipulates perf events that trigger a counter overflow or group throttling.
Risk and Exploitability
No EPSS score or CVSS data are available, but the vulnerability can be triggered by generating perf events that overflow. Because the bug leads to a kernel panic, it poses a high local‑impact risk that can severely disrupt availability. The vulnerability is not listed in the CISA Known‑Exploited Vulnerabilities catalog, and no public exploit is known, suggesting that automated exploitation is unlikely but the potential for manual or privileged attacks remains. The reliance on a low‑level hardware counter implies that only locally privileged code or a process that can control perf events can trigger it, but the severity of the resulting crash makes it a critical issue for affected systems.
OpenCVE Enrichment