Impact
A use‑after‑free vulnerability exists in the UFS driver of the Linux kernel. The flaw causes the crypto cleanup routine to run after the underlying UFS host structure has already been freed during device removal or an error in the initialization path. This leads to kernel memory corruption that can grant an attacker the ability to execute arbitrary code or elevate privileges. The weakness is classified as CWE‑416, a classic use‑after‑free issue.
Affected Systems
The vulnerability affects Linux kernel builds that include UFS support, starting with version 6.14 RC1 and continuing through all later releases until the patch is applied. All Linux distributions that ship these kernel versions are impacted.
Risk and Exploitability
The CVSS score of 7.8 reflects a medium‑to‑high impact. EPSS indicates an exploitation probability of less than 1%, and the flaw is not listed in CISA KEV. Exploitation requires local or privileged access to trigger a UFS device removal or initialization failure, so there is no known remote attack vector. The likely attack path is inferred to be local, requiring the attacker to influence driver unload or error handling on the target system.
OpenCVE Enrichment
EUVD
Ubuntu USN