Impact
A use‑after‑free occurs when the virtio_net driver runs with napi_tx disabled and the IFF_XMIT_DST_RELEASE flag is cleared while transmitted packets remain in the virtio ring; destroying the network namespace frees the underlying dst_ops structure, causing a subsequent packet transmission to dereference a freed pointer and trigger a kernel paging request. The flaw is a classic Use‑After‑Free (CWE‑416) that results in an unconditional crash and denial of service rather than arbitrary code execution.
Affected Systems
The vulnerability affects the Linux kernel, specifically the virtio_net driver module. Version information is not enumerated in the advisory; however, the issue was confirmed against a 7.0.0‑rc1 kernel instance and is likely present in all kernels that have not applied the commit that introduces skb_dst_drop in start_xmit.
Risk and Exploitability
The CVSS score is not provided and EPSS is unavailable; the vulnerability is not listed in CISA KEV. Exploitation requires a local user with the ability to create and delete network namespaces or manipulate netlink qdisc settings, which effectively grants root or at least kernel‑module capability. Given that the impact is a forced kernel panic, the risk is high for affected systems, but the vector is limited to privileged locals. In practice, operators should assess whether they run untrusted software with netns or tc access before applying this fix.
OpenCVE Enrichment