Impact
In the DAMON subsystem of the Linux kernel, executing damon_call() against a context that has ceased operation leaves a dangling call_control pointer in the context’s call_controls list. Subsequent invocations of damon_call() reuse this stale pointer, resulting in a use‑after‑free that can corrupt kernel memory. The primary effect is memory corruption that, if an attacker can trigger it, may allow them to crash the kernel or potentially gain arbitrary code execution, depending on the surrounding memory state. This is a classic use‑after‑free weakness (CWE‑416).
Affected Systems
The flaw affects the Linux kernel, specifically versions where the DAMON subsystem had not incorporated the fix—this includes kernel 6.17 and all 6.19 release‑candidate releases from rc1 through rc8. Systems running those kernels with the DAMON sysfs interface enabled are vulnerable. The impacted product line is Linux:Linux, as listed by the CNA, with CPE references covering linux_kernel 6.17 and 6.19 rc1–rc8.
Risk and Exploitability
The advisory lists a CVSS base score of 7.8, indicating high severity, while the EPSS score is under 1 %, suggesting a low probability that the flaw has already been exploited. The vulnerability is not present in CISA's KEV catalog. Exploitation requires write access to the DAMON sysfs interface and the ability to perform a specific, non‑trivial sequence of file writes; it is not trivially exploitable by ordinary unprivileged users. Consequently, the overall risk is moderate, rising only if sysfs write permissions are broadly available or if the attacker can achieve elevated privileges to manipulate the DAMON interface.
OpenCVE Enrichment