Impact
A race condition (CWE‑364) and use‑after‑free bug (CWE‑416) exist in the Linux kernel’s netfilter BPF subsystem. When a process with access to the nfnetlink_hooks interface dumps hooks concurrently, the kernel releases hook memory before RCU readers have finished. This race leads to a use‑after‑free in the hook memory, causing kernel memory corruption that could potentially be leveraged for arbitrary code execution.
Affected Systems
The flaw affects the Linux kernel across all releases that implement the netfilter BPF component and the nfnetlink_hooks interface. No specific kernel versions are listed, so any current kernel may be impacted.
Risk and Exploitability
The CVSS score of 7.8 indicates high severity, and the EPSS score of less than 1% still suggests a low likelihood of exploitation. The vulnerability is not in the CISA KEV catalog. Based on the description, it is inferred that exploitation would require a local user with sufficient privileges to invoke nfnetlink_hooks, making the attack vector local.
OpenCVE Enrichment
Debian DSA