Impact
The vulnerability is a use‑after‑free flaw (CWE‑416) in the Linux kernel driver for Intel Ethernet 800 series devices. The flaw can be triggered by an unprivileged software attacker who is authenticated on the host, allowing the kernel to dereference freed memory and crash. The effect is a local denial of service in kernel mode (ring 0) with no impact on confidentiality or integrity. An attacker with a low‑complexity attack could cause the system to become unusable, requiring a reboot.
Affected Systems
Intel Ethernet 800 series drivers bundled with the Linux kernel before version 2.3.14 are affected. The flaw exists in the driver code shipped with these driver packages. Systems deploying those driver versions on Linux kernels are at risk.
Risk and Exploitability
The CVSS score of 6.8 indicates a moderate severity and the EPSS score is not available, but the vulnerability is not listed in CISA’s KEV catalog. The attack requires local access, authentication, and a low‑complexity exploit, meaning a nearby attacker who can run code on the system can readily trigger a crash. The lack of confidentiality or integrity impact limits the damage to service availability.
OpenCVE Enrichment