CVE-2026-23012Use After Free in Linux

CWE-416Use After Free7 documents6 sources
Severity
7.8HIGHNVD
EPSS
0.0%
top 94.95%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 25

Description

In the Linux kernel, the following vulnerability has been resolved: mm/damon/core: remove call_control in inactive contexts If damon_call() is executed against a DAMON context that is not running, the function returns error while keeping the damon_call_control object linked to the context's call_controls list. Let's suppose the object is deallocated after the damon_call(), and yet another damon_call() is executed against the same context. The function tries to add the new damon_call_control ob

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages5 packages

Linuxlinux/linux_kernel6.17.06.18.7
NVDlinux/linux_kernel6.17.16.18.7+2
Debianlinux/linux_kernel< 6.18.8-1
CVEListV5linux/linux004ded6bee11b8ed463cdc54b89a4390f4b64f6d23b061f421eef03647b512f3df48861706c87db3+2
debiandebian/linux< linux 6.18.8-1 (forky)

Patches

🔴Vulnerability Details

3
GHSA
GHSA-mprh-g3xh-wh7r: In the Linux kernel, the following vulnerability has been resolved: mm/damon/core: remove call_control in inactive contexts If damon_call() is execu2026-01-25
OSV
CVE-2026-23012: In the Linux kernel, the following vulnerability has been resolved: mm/damon/core: remove call_control in inactive contexts If damon_call() is execute2026-01-25
OSV
mm/damon/core: remove call_control in inactive contexts2026-01-25

📋Vendor Advisories

2
Red Hat
kernel: mm/damon/core: remove call_control in inactive contexts2026-01-25
Debian
CVE-2026-23012: linux - In the Linux kernel, the following vulnerability has been resolved: mm/damon/co...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-23012 Impact, Exploitability, and Mitigation Steps | Wiz