Impact
The Linux kernel’s inode_switch_wbs_work_fn() loop could start work on a writeback structure after that structure had already been freed, creating a use‑after‑free scenario. A malicious local process could exploit this flaw to corrupt kernel memory, potentially gaining elevated privileges or executing arbitrary code in kernel mode, which could compromise system integrity.
Affected Systems
This vulnerability affects the Linux kernel. Specific affected kernel versions are not listed in the provided data; the fix is present in the latest stable kernel branches that incorporate the referenced commit.
Risk and Exploitability
The CVSS score of 7.0 indicates high severity. A use‑after‑free in kernel space is normally considered high severity with a high probability of exploitation in a privileged or local context. The EPSS score is unavailable and the vulnerability is not currently in the CISA KEV catalog. Nevertheless, an attacker on the affected system could trigger the flaw by manipulating the writeback subsystem, so the risk is significant for each host that runs a kernel version without the patch.
OpenCVE Enrichment