Impact
The vulnerability arises from the virt_wifi driver calling SET_NETDEV_DEV during initialization. If a virt_wifi device is unregistered while an ethtool operation is in progress, the device’s parent pointer can reference freed memory, leading to a use‑after‑free condition. This memory corruption can be exploited to trigger arbitrary code execution or cause system instability.
Affected Systems
All Linux kernel releases that include the virt_wifi driver are affected. No specific version range is provided, so any kernel that ships with virt_wifi could be vulnerable until the fix is applied.
Risk and Exploitability
No EPSS score is available and the vulnerability is not listed in the CISA KEV catalog. The CVSS score is not disclosed in the provided data. The attack likely requires local access to the device and the ability to run ethtool commands on a virt_wifi interface that is being unregistered. Given the lack of publicly known exploits, the risk is considered moderate to high until the fix is deployed.
OpenCVE Enrichment
Debian DLA
Debian DSA