Impact
The Linux kernel contains a flaw in the network buffer (skb) free logic. The flaw corresponds to CWE-763 and, based on the allocation behavior, also reflects a potential mismanagement of resources (CWE-401). When Kernel-Fences are enabled, the allocation routine returns the requested size instead of the slab bucket size, which causes skb_kfree_head() to incorrectly classify the object’s slab cache during deallocation. This cross-cache free can corrupt kernel memory or trigger a kernel crash, potentially affecting system reliability and security.
Affected Systems
This vulnerability applies to any Linux kernel release containing the unchanged skb allocation code before the upstream patch is applied. All distributions that ship the code without changes are impacted. No specific distribution version information is provided, so the affected range is all kernels prior to the committed hotfix.
Risk and Exploitability
The CVSS score of 5.5 indicates a moderate severity vulnerability, while the EPSS score of <1% suggests a low probability of exploitation in the near term. The CVE does not describe a concrete exploitation path; it only notes that an attacker would need to allocate skb heads with the exact size that triggers the misclassifying free. The vulnerability is not listed in CISA’s KEV catalog, and the available evidence points to a moderate risk should a privileged or local attacker be able to trigger the allocation path.
OpenCVE Enrichment
Debian DSA