Impact
The vulnerability arises in the Linux kernel's netfilter nf_tables component when a set reaches its maximum capacity. The implementation incorrectly bumps the element counter before inserting a new entry and then removes the element without allowing an ongoing RCU read to finish. This race condition can lead to stale data being accessed, potentially corrupting kernel memory or causing a crash. The weakness is a classic race condition (CWE‑367). An adversary could exploit it to destabilize the kernel, triggering a denial of service or, in a worst‑case scenario, facilitating privilege escalation through a crash or memory corruption.
Affected Systems
All Linux kernel releases that include the nf_tables subsystem are potentially affected. Because the advisory does not list specific kernel version numbers, any system running an unsupplied kernel prior to the patch commit is at risk. The issue applies to standard Linux distributions as well as custom builds that ship the default kernel.
Risk and Exploitability
With a CVSS base score of 7.8 the vulnerability is considered high. The EPSS score is below 1 %, indicating a low current exploitation probability. The vulnerability is not listed in the CISA KEV catalog, suggesting no known public exploits. An attacker could theoretically trigger the bug by inserting elements into a full nf_tables set either locally or via network‑bound nftables commands. Prompt mitigation lowers the risk considerably.
OpenCVE Enrichment