Impact
The flaw is a race condition in the TLS stack of the Linux kernel that allows a worker to access a TLS context that has already been freed. The use‑after‑free can lead to an arbitrary instruction pointer takeover or a process crash. The underlying weakness is a use‑after‑free (CWE‑416) triggered by a race condition (CWE‑362).
Affected Systems
All Linux kernel releases prior to the commit that replaces cancel_delayed_work_sync with disable_delayed_work_sync are affected. The patch is distributed in the mainline kernel upstream and referenced by several git commits. Linux distributions that have not yet included these commits remain vulnerable.
Risk and Exploitability
The CVSS base score of 9.8 indicates a critical severity. The EPSS score is below 1%, which suggests a low probability of widespread exploitation, but the flaw is not listed in CISA’s KEV catalog. Based on the description, it is inferred that an attacker who can manipulate TLS traffic to a vulnerable service is likely able to trigger the race condition, and therefore the attack vector is a remote TLS connection. Exploitability is inferred to be feasible in environments where TLS clients can be controlled, allowing an attacker to trigger the use‑after‑free and potentially execute arbitrary code.
OpenCVE Enrichment
Debian DSA