Impact
A use‑after‑free bug exists in the Linux kernel’s netfilter BPF subsystem. When a process with access to the nfnetlink_hooks interface dumps hooks concurrently, the kernel releases hook memory before RCU readers have finished, leading to kernel memory corruption. The crash and memory corruption may provide an attacker an opportunity to execute arbitrary code, though this possibility is inferred rather than explicitly stated in the advisories.
Affected Systems
The flaw affects the Linux kernel across all releases that implement the netfilter BPF component and the nfnetlink_hooks interface. No specific kernel versions are listed, so any current kernel may be impacted.
Risk and Exploitability
The CVSS score of 5.5 indicates moderate severity, and the EPSS score of less than 1% suggests a low likelihood of exploitation at present. The vulnerability is not in the CISA KEV catalog. Based on the description, it is inferred that exploitation would require a local user with sufficient privileges to invoke nfnetlink_hooks, making the attack vector local.
OpenCVE Enrichment