Impact
The Linux kernel’s nft_set_pipapo set type contains a use‑after‑free bug identified as CWE‑825. When many elements expire, the garbage‑collection routine can run for an extended period while the kernel is in a non‑preemptible context, allowing the freed memory to be accessed afterward. This condition triggers soft lockup warnings and RCU stall reports, effectively hanging the system and denying local functionality.
Affected Systems
The flaw resides in the core Linux kernel and affects all Linux distributions that ship an unpatched kernel. No specific kernel version range is listed, so users must check whether their current kernel includes the highlighted patch, typically available in recent releases from the mainline kernel series.
Risk and Exploitability
The CVSS score of 7.8 signals a high severity, yet the EPSS score is below 1 % and the vulnerability is not in the CISA KEV catalog, indicating a low current exploitation likelihood. Exploitation requires local or privileged access to manipulate the pipapo set type and force many entries to expire. The attack vector is inferred to be local, needing kernel‑level privileges; an attacker would trigger the long GC run to cause service denial.
OpenCVE Enrichment