Impact
A flaw in the Linux kernel’s mana driver can leave the data‑structure field service_wq pointing to freed memory during an error path in mana_gd_setup(). If the field is accessed after a failed setup, a use‑after‑free can occur, potentially causing a kernel panic or allowing an attacker to execute code in kernel mode. The weakness is a classic use‑after‑free scenario (CWE‑825), and the kernel‑level nature of the defect makes any successful exploitation highly damaging to system integrity and availability.
Affected Systems
The issue exists in any Linux kernel that compiles the mana driver, regardless of the major kernel release. All builds that contain the buggy mana_gd_setup() code before the patch are considered vulnerable. Distribution maintainers or custom kernel builds that have not applied the commit adding the null assignment remain at risk until an updated kernel is deployed.
Risk and Exploitability
The CVSS score of 7.0 reflects a high‑severity use‑after‑free in the kernel. The EPSS score is 0.00017, and the vulnerability is not listed in the CISA KEV catalog, indicating no widespread public exploitation known. Exploitation would require a local attacker with the ability to trigger the failed setup path, such as loading a malicious kernel module or executing code with sufficient privileges to manipulate the driver. Once the patch is applied, the fault is eliminated by nulling the workqueue pointer and preventing a double destroy.
OpenCVE Enrichment