Impact
The vulnerability resides in the Linux kernel's network emulator (netem) component. A missing update to the backlog length (sch->q.qlen) before invoking qdisc_tree_reduce_backlog() causes a use‑after‑free (CWE‑416) in the DRR qdisc’s qlen_notify callback. If an attacker can trigger this flaw, the freed memory may later be re‑used by the kernel, potentially enabling arbitrary code execution at ring‑0 or causing a system crash.
Affected Systems
The flaw affects all Linux kernel releases that include the netem module, including release candidate 6.14 rc1 and earlier unpatched kernels. Any host running these kernels with netem enabled is susceptible. Based on the description, it is inferred that the impact is primarily local, requiring the attacker to run code with sufficient privileges to manipulate qdisc settings or to send traffic that engages the netem module.
Risk and Exploitability
The CVSS base score of 7.8 indicates high severity. The EPSS score is less than 1%, suggesting a very low current exploitation probability. The vulnerability is not listed in CISA’s KEV catalog. The likely attack vector is local, and the attacker would need to trigger a malformed backlog state. Based on the description, it is inferred that exploitation would involve manipulations that empty a child qdisc to trigger the use‑after‑free.
OpenCVE Enrichment
Debian DLA
EUVD
Ubuntu USN