Impact
In the Linux kernel, the helper addrconf_permanent_addr contains logic that warns users of an exceptional condition after the IPv6 address structure may already have been freed. The message is delivered too late, so the code can access memory that has potentially been reclaimed, creating a classic use‑after‑free flaw.
Affected Systems
All Linux kernel implementations are affected; the vulnerability exists until the patch that reorders the warning and moves it outside the idev->lock guard is applied.
Risk and Exploitability
The use‑after‑free flaw allows kernel code to access memory that may have already been freed, potentially corrupting kernel state. The description does not detail the exact consequences an attacker could achieve, so we cannot assert whether denial of service or privilege escalation is possible. Potential system crashes or instability are inferred from the nature of use‑after‑free bugs, but such outcomes are not explicitly stated in the public data. The EPSS score is not included in the input, so we infer it is unavailable; likewise, no CVSS score is provided, and the vulnerability is not listed in CISA KEV. Because of these data gaps, the likelihood of exploitation cannot be determined from the available information.
OpenCVE Enrichment