CVE-2026-43416

medium Red Hat
CVSS v3 Base Score
7.0
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score
0.0%
Exploitation probability in 30 days
Top 96% most likely to be exploited
Attack Characteristics
Attack Vector
Local
Attack Complexity
High
Privileges Required
Low
User Interaction
None
Confidentiality
High
Integrity
High
Availability
High
Published: May 8, 2026 (6 days ago)
Last Modified: May 8, 2026
Vendor: Red Hat
Source: REDHAT

Description

A flaw was found in the Linux kernel. A local user can cause a denial of service (DoS) by triggering a NULL pointer dereference within the `perf` subsystem. This occurs when the memory management structure (`current->mm`) is prematurely released before the system attempts to retrieve the user callchain, leading to a kernel panic. This vulnerability can be exploited by running a profiling BPF (Berkeley Packet Filter) program.

CWE

CWE-826

Affected Products

Red Hat Enterprise Linux 10Red Hat Enterprise Linux 6Red Hat Enterprise Linux 7Red Hat Enterprise Linux 8Red Hat Enterprise Linux 9

References