Impact
The Linux kernel introduced a read‑only flag on the swap address space that, when it caused a failure in arch_prepare_to_swap under intense memory pressure, could trigger a kernel panic. This results in a denial of service by crashing the operating system. The underlying weakness is improper error handling in memory reclamation.
Affected Systems
The vulnerability affects the Linux kernel. The affected releases include every Linux kernel version that contained the read‑only swap space implementation before the downstream commit that removed the read‑only flag, specifically Linux kernel 6.19 release candidates rc1 through rc7 and all earlier kernels that had not yet incorporated the corrective change.
Risk and Exploitability
The CVSS v3 score is 5.5, representing moderate severity. The EPSS score of less than 1% indicates a very low estimated likelihood of exploitation, and the vulnerability is not listed in CISA’s KEV catalog. Exploitation would require inducing heavy memory pressure while the kernel attempts to reclaim pages, a scenario typically limited to local or system‑wide stress attacks rather than a remote, user‑directed exploit. Consequently, the risk is moderate but may be significant in environments where uninterrupted kernel operation is critical.
OpenCVE Enrichment