Impact
A flaw in the Linux kernel’s Intel performance monitoring unit code allows a container_of misuse in the intel_pmu_set_acr_caused_constr helper to read memory beyond the intended bounds. The exploit is limited to systems using the x86 hybrid PMU when a group of events contains software events. The out‑of‑bounds read can expose kernel memory contents and may result in system instability or a crash, affecting confidentiality and availability. The weakness is a buffer‑overread error.
Affected Systems
The vulnerability affects the Linux kernel, as identified by the vendor and product entries "Linux:Linux". No specific kernel version range is listed in the CNA data, so all kernels containing the unpatched code path are potentially exposed.
Risk and Exploitability
The EPSS score is unavailable and the vulnerability is not listed in the CISA KEV catalog. The absence of an exploitable user‑mode entry point limits the attack depth; an attacker would need to compromise kernel execution or combine this flaw with another privileged‑level vulnerability to benefit. The CVSS score is not supplied, but the nature of the bug—out‑of‑bounds memory access in kernel space—implies a potentially high impact if exploited. The likely attack vector is local privilege escalation or a previously‑established kernel exploit. Overall, the risk is moderate to high for affected systems awaiting a patch.
OpenCVE Enrichment