Impact
The flaw lies in the Linux kernel's nf_tables subsystem where a flush set operation attempts to clone a set that should not be cloned. This incorrect clone triggers a failing memory allocation with GFP_KERNEL, resulting in a kernel warning (WARN splat). The weakness corresponds to a resource exhaustion issue (CWE‑770) and can cause system instability through repeated warnings or potential memory exhaustion if the fault is repeatedly induced.
Affected Systems
All Linux kernel installations that include the nf_tables netfilter component are potentially affected. The data does not specify any particular kernel releases or distribution versions, so the vulnerability applies broadly until the patch is applied.
Risk and Exploitability
The CVSS score of 5.5 indicates moderate severity, while the EPSS score of less than 1% suggests a very low likelihood of exploitation. The vulnerability is not listed in the CISA KEV catalog. Based on the description, it is inferred that the attack vector is a local or privileged interface that can invoke the nf_tables flush API. This limits the risk of remote exploitation. Overall, the threat remains moderate but the chance of real-world exploitation is low.
OpenCVE Enrichment