Impact
A use‑after‑free condition exists in the Linux kernel’s cgroup/dmem subsystem, where a memory pool can be freed while callers still hold references to it. Based on the description, it is inferred that this flaw can lead to kernel memory corruption, potentially allowing an attacker to execute arbitrary code within the kernel if the vulnerability is exploited.
Affected Systems
The flaw affects Linux kernel release candidates 6.19‑rc1 through 6.19‑rc8, as identified by the corresponding Common Platform Enumeration strings. Systems running any of these kernels should verify their build and determine whether they are impacted.
Risk and Exploitability
The CVSS score of 7.0 reflects a moderate to high severity, while the EPSS score of less than 1% suggests a low probability of exploitation in the wild. The vulnerability has not been listed in CISA’s KEV catalog, indicating no known widespread exploitation. It is inferred that exploitation would likely require local privileged access or the ability to load kernel modules that interact with the cgroup/dmem API, making it a local privilege escalation vector.
OpenCVE Enrichment