Impact
The vulnerability occurs when the NETDEV_REGISTER notification is processed; the kernel may attempt to register a network device that has already been added by the nft_netdev_hook_alloc() routine during hook creation. This duplicate registration can lead to unintended resource handling or kernel inconsistencies within the netfilter subsystem, which may in turn affect the reliability of network filtering. No confidentiality or integrity impacts are explicitly described, but based on the description it is inferred that the mishandling could raise the risk of service disruption. The official fix resolves the issue by preventing the duplicate device registration.
Affected Systems
The affected component is the Linux kernel. No specific kernel versions are enumerated in the advisory, but the fix is present in recent kernel source updates, as referenced by the provided commit URLs.
Risk and Exploitability
The EPSS score of 0.00017 (less than 1%) indicates a very low likelihood of exploitation. The vulnerability is not listed in the CISA KEV catalog, indicating no public exploits are known. The CVSS score of 5.5 suggests a moderate impact. Based on the description, it is inferred that the vulnerability would require a privileged attacker with kernel access to trigger duplicate device registration, making the attack vector highly privileged and local. With the low EPSS and absence of known exploits, the risk is considered low to moderate when other mitigating factors are absent, but administrators should still address the issue promptly to avoid potential operational instability.
OpenCVE Enrichment