An issue was discovered in the Linux kernel in the filter parsing code in kernel/trace/trace_events_filter.c. The code could be called with no filter, when it expected at least one. This allows attackers to cause a slab out-of-bounds write and so a denial of service via crafted perf_event_open and mmap system calls.
An upstream patch:
Created kernel tracking bugs for this issue:
Affects: fedora-all [bug 1595837]