Impact
The CVE involves a use‑after‑free flaw in the Linux kernel's CAN ISO‑TP driver (CWE‑416) coupled with a race condition (CWE‑364). When a close operation is interrupted by a signal while a transmission is in progress, the driver may free the transmission buffer before the sending routine has finished using it. This can lead to kernel memory corruption, a crash, or denial of service.
Affected Systems
All Linux kernel installations that include the problematic CAN ISO‑TP driver are potentially vulnerable; the CVE does not specify particular kernel releases, and the list of affected versions is not provided in the vendor data.
Risk and Exploitability
The CVSS base score is 7.8, indicating high severity. The EPSS score is <1%, showing a low likelihood of exploitation. Attackers would need to trigger a close operation with an interrupting signal while a transmission is underway, a scenario that is difficult to accomplish from a remote context but possible from a local or privileged environment. Since no public exploits exist, the risk is primarily the potential for a kernel crash or memory corruption that could be exploited to gain higher privileges or disrupt system availability. The flaw is not listed in CISA’s KEV catalog, and the attack vector is confined to local or remote code execution that affects the CAN network stack.
OpenCVE Enrichment
Debian DSA