Impact
This vulnerability is a use‑after‑free in the Linux kernel TI ICSSG PRU Ethernet driver. When a descriptor pointer returned by cppi5_hdesc_get_psdata() is freed before the timestamp handling code dereferences it, the driver triggers a use‑after‑free on every packet that enables timestamping. The resulting memory corruption can cause a kernel crash, but the CVE description does not mention any capability for arbitrary code execution.
Affected Systems
The flaw is present in the Linux kernel’s TI ICSSG PRU Ethernet driver (net:ti:icssg-prueth). All distributions that ship a kernel compiled with this driver enabled are affected. The CPE data indicates that the issue exists in all kernel versions before the fix, so administrators should upgrade to the latest stable kernel release that incorporates the patch.
Risk and Exploitability
The CVSS score of 9.8 classifies this flaw as critical, while the EPSS score of less than 1% suggests a very low probability of exploitation at this time. The flaw is not listed in the CISA KEV catalog. It can be triggered by any packet processed by the driver when timestamping is performed, so a threat actor could potentially send crafted network traffic to reproduce the use‑after‑free and destabilize the system. The documented impact is memory corruption and possible system crash; no evidence of privilege escalation or code execution is provided.
OpenCVE Enrichment