Impact
The vulnerability resides in the Linux kernel’s TEQL traffic scheduler. A double‑free can occur when a lockless root qdisc calls qdisc_reset without acquiring the appropriate seq_lock. This race allows the same socket buffer to be released twice, triggering a KASAN kernel panic. The result is an abrupt system crash, which constitutes a denial‑of‑service condition.
Affected Systems
All systems running a Linux kernel that includes the TEQL queueing discipline and has not incorporated the corrective commit are vulnerable. Distribution packages that ship an unpatched kernel binary with TEQL support expose the flaw; the advisory does not specify a precise version range, so the fix applies to every recent kernel revision before the patch.
Risk and Exploitability
The CVSS score of 5.5 shows moderate severity, while an EPSS score of less than 1 % and absence from the CISA KEV catalog indicate a low likelihood of exploitation. The likely attack vector is local or privileged, as an attacker would need to influence traffic processing to trigger the race condition. No remote code execution or data exfiltration has been demonstrated; the impact is purely a denial of service through a kernel crash.
OpenCVE Enrichment