Impact
The CVE involves a use‑after‑free flaw in the Linux kernel's CAN ISO‑TP driver. When a close operation is interrupted by a signal while a transmission is in progress, the driver may free the transmission buffer before the sending routine has finished using it. This exposes corrupted memory references that could lead to a kernel crash, data corruption, or a denial‑of‑service condition for the affected system.
Affected Systems
All Linux kernel installations that include the problematic CAN ISO‑TP driver are potentially vulnerable; the CVE does not specify particular kernel releases, and the list of affected versions is not provided in the vendor data.
Risk and Exploitability
The vulnerability is limited to kernel space and requires local or remote code execution that can trigger the close path with an interrupting signal. While no exploit proof‑of‑concepts have been reported, the use‑after‑free could be leveraged to crash the system or perform memory corruption. Because the exploit requires precise timing of an interrupt during a close operation, the probability of successful exploitation is unclear, and the EPSS score is not available. Nevertheless, the vulnerability is listed in the kernel source, and the recommendation is to treat it as a high‑risk issue.
OpenCVE Enrichment