Impact
The bug occurs when the nft_ct timeout object is freed by kfree immediately after nf_ct_untimeout without waiting for an RCU grace period. While other CPUs may still reference the object via rcu_dereference, this can lead to a slab use‑after‑free. Based on the KASAN report, it is inferred that malformed or specially crafted packets could trigger the flaw, resulting in memory corruption.
Affected Systems
All Linux kernel releases prior to the patch, including kernel 4.19 and the 7.0 release candidates from RC1 through RC7. The fix is included in later commits referenced in the Linux kernel repository and should be present in subsequent stable releases.
Risk and Exploitability
The CVSS score of 7.8 reflects a high severity vulnerability. The EPSS score of less than 1% suggests that, at the time of analysis, exploitation is unlikely yet. The vulnerability is not listed in the CISA KEV catalog. It is inferred that exploitation might require local privileges or network access that can send specially crafted packets, but the advisory does not provide explicit attack vectors.
OpenCVE Enrichment
Debian DLA
Debian DSA