Impact
The vulnerability is a use‑after‑free condition (CWE‑416, CWE‑367) in the bcache subsystem of the Linux kernel. When a bcache device is stopped while a superblock write is in progress, the cached_dev.sb_bio pointer is freed but later accessed during the I/O completion callback. The resulting memory corruption causes a kernel crash, which can terminate critical services.
Affected Systems
All Linux kernel implementations that include the bcache module and are running versions prior to the patch that introduced the safe free logic are affected. Both vendor and community kernels are susceptible, as the CNA list identifies the product simply as "Linux: Linux" and no specific version range is provided. Users of bcache on any recent kernel should verify whether the applied kernel contains the commit referenced in the advisory.
Risk and Exploitability
The CVSS score of 7.8 indicates a high severity for instability. The EPSS score is reported as less than 1%, signalling that the probability of exploitation is low at this time and the vulnerability is not currently included in the CISA Known Exploited Vulnerabilities catalog. The likely attack vector is local, requiring the ability to stop a bcache device that is actively writing data. An attacker with local system access could attempt to trigger the crash, causing a denial of service.
OpenCVE Enrichment
Debian DSA