Impact
The vulnerability in the Linux kernel causes the DAMON sysfs directory setup to leave behind an access_pattern subdirectory when the scheme initialization fails. This failure results in a memory leak and disables the DAMON sysfs interface until the system is rebooted. The leak occurs during kernel initialization or when the DAMON subsystem is started, potentially degrading system stability and preventing further use of the legacy memory monitoring interface.
Affected Systems
Affected products are all Linux kernel releases that contain the DAMON sysfs scheme code, including the 6.19 release candidates from rc1 through rc5. The issue is present in the generic Linux kernel and should be addressed in any distribution that ships these kernel versions.
Risk and Exploitability
The CVSS score of 5.5 indicates moderate severity, and the EPSS score of less than 1% reflects a low likelihood of exploitation. The vulnerability is not listed in the CISA KEV catalog, suggesting no known active exploitation. The attack vector is inferred to be local, requiring an attacker with kernel or root privileges to trigger repeated DAMON sysfs failures or to force a system reboot for recovery. The primary risk is to availability: if the sysfs interface remains broken, tools that rely on DAMON may fail, and memory leaks may accumulate until reboot.
OpenCVE Enrichment