Impact
The vulnerability in the Linux kernel's Open vSwitch code allows a race condition that frees a network device before the teardown and unregistration processes finish. This leads to a use‑after‑free trigger inside netdev_destroy, causing a general protection fault and kernel panic. The impact is a denial‑of‑service and loss of system stability. Based on the description, it is inferred that an attacker could cause the crash by interacting with the Open vSwitch interface or by generating high traffic during port teardown.
Affected Systems
It affects all Linux kernel releases that contain the unmodified Open vSwitch (OVS) teardown routine before the patch referenced in the advisory URLs. No specific version numbers are provided; therefore, any kernel build prior to the included fix is considered vulnerable. The issue is present in both standard and PREEMPT_RT kernels.
Risk and Exploitability
The flaw requires a race between ovs_netdev_detach_dev and netdev_destroy, which is easier on PREEMPT_RT kernels or under heavy load. The EPSS score is < 1% and the vulnerability is not listed in CISA KEV, indicating limited publicly known exploitation but a local or low‑privilege attacker could trigger it. The CVSS score of 7.8 indicates high severity, and because a kernel crash results, the impact is a denial‑of‑service that can bring the system down. The exploit path is local: an attacker that can send messages to the Open vSwitch API or control the port lifecycle can induce the race and cause the crash.
OpenCVE Enrichment
Debian DLA
Debian DSA