Impact
The flawed pfifo_head_drop enqueue logic increments the child queue length without correctly updating the parent, breaking the invariant that a parent qdisc’s length equals the sum of its children’s lengths. This logic error, classified as CWE‑438, can corrupt kernel state during packet scheduling and, as the CVE notes, lead to privilege escalation when the defect is reachable.
Affected Systems
Linux kernel versions that include the pfifo_head_drop queue and in which this code path exists are affected. The CVE references a known bug in kernel 6.14 release candidate 1, indicating that kernels around that version, and likely earlier ones containing the same implementation, are vulnerable. The issue manifests when a parent scheduler enqueues a packet to a child pfifo_head_drop qdisc configured with a limit of zero, a scenario that can occur in standard Linux distributions that provide the tc command interface.
Risk and Exploitability
The CVSS score of 7.8 signals high severity. The EPSS score of less than 1% suggests that exploitation is presently rare, and the vulnerability is not listed in CISA KEV, though that does not lessen potential risk. The likely attack vector is local manipulation of traffic‑control settings, which requires user‑level access to execute tc commands. Successful exploitation could corrupt kernel data structures and enable a local attacker to gain elevated privileges, making the impact system‑wide if the buggy code path is triggered.
OpenCVE Enrichment
Debian DLA
Debian DSA
EUVD
Ubuntu USN