Impact
In the Linux kernel’s netfilter xt_CT module, templates used by zone and event cache filters can be removed while packets are queued. This causes pending enqueued packets to be dropped, which can result in significant packet loss and may lead to denial of service. The weakness is a resource management flaw, classified as CWE–911.
Affected Systems
Affected systems include all Linux kernel distributions that use the netfilter xt_CT module. Vendor information lists Linux:Linux, and no specific version numbers are provided in the official data.
Risk and Exploitability
The vulnerability carries a CVSS score of 7.8, indicating moderate to high severity. The EPSS score is less than 1 %, suggesting a low likelihood of exploitation, and it is not listed in the CISA KEV catalog. Exploitation would require the ability to manipulate the kernel’s netfilter templates—such as by unloading helper modules or triggering nfnetlink_cttimeout to remove them—while traffic is being processed, which implies privileged access to the operating system.
OpenCVE Enrichment