Impact
The vulnerability is a use‑after‑free in the Linux kernel networking scheduler that allows an attacker to replace a child queuing discipline (qdisc) from one parent to another. This manipulation can leave dangling references and cause memory corruption that, if triggered, may lead to arbitrary code execution or privilege escalation. The core weakness is a classic use‑after‑free (CWE‑416).
Affected Systems
This issue affects the Linux kernel in all current releases prior to the patch that disables the replace operation between different parents. The vulnerability is documented in the kernel commit tree and affects all distribution kernels that have not incorporated the change, including Debian LTS releases mentioned in the advisory mailing list.
Risk and Exploitability
The CVSS score of 7.8 indicates high severity, while the EPSS score of <1% shows that exploitation is unlikely or unobserved. KEV does not list this vulnerability, implying no known widespread exploitation. Attackers would need to execute the tc commands that manipulate qdiscs, which generally requires CAP_NET_ADMIN or root privileges, so the vector is local privilege escalation rather than remote exploitation.
OpenCVE Enrichment
Debian DLA
EUVD
Ubuntu USN