Impact
A bug in the Linux kernel’s virtual memory area handling causes an incorrectly duplicated anonymous VMA state during an mremap() operation on a faulted VMA adjacent to an unfaulted VMA. The flaw results in a use‑after‑free that corrupts kernel memory; if exploited, this could compromise confidentiality, integrity, or availability of a system. Based on the description, it is inferred that the attack vector involves a local kernel vulnerability where the attacker must be able to trigger an mremap() on a faulted VMA.
Affected Systems
The vulnerability affects the Linux kernel specification and has been recorded against kernel release candidate 6.19 tags rc1 through rc5, as listed in the CPE identifiers. Any system running a kernel version that includes these release candidates without the patch is considered vulnerable.
Risk and Exploitability
With a CVSS score of 7.8 the exploit is considered high severity. The EPSS probability is below 1 %, indicating a low likelihood of exploitation at the time of analysis, and it is not listed in the CISA KEV catalog. The flaw requires kernel execution context and the ability to trigger a faulted mremap() on a faulted VMA, making it a local kernel vulnerability that could lead to memory corruption and compromise system confidentiality, integrity, or availability. The determination that this is a local kernel vulnerability is inferred from the description, as the attack vector is not explicitly stated.
OpenCVE Enrichment