Impact
A use‑after‑free issue in the Linux kernel’s netfilter BPF subsystem occurs when a concurrent process dumps hook information via nfnetlink_hooks. The flaw leads to a slab‑use‑after‑free detected by KASAN, triggering a kernel memory read that can cause a crash. The nature of the bug is a kernel memory corruption that manifests as a denial‑of‑service through system reboot or loss of service.
Affected Systems
The vulnerability affects the Linux kernel, specifically the netfilter BPF code path that handles nfnetlink hook dumping. No exact kernel version information is provided in the advisory, so any kernel release that incorporates the affected code before the patch is potentially impacted.
Risk and Exploitability
The CVSS score is not provided, but the EPSS score is reported as less than 1 % and the vulnerability is not listed in the CISA KEV catalog. Based on the description, the likely attack vector is local: an attacker that can send nfnetlink hook dump requests may trigger the flaw. The risk is primarily a denial‑of‑service via kernel crash, and no explicit claim of privilege escalation can be made from the available information.
OpenCVE Enrichment