Impact
The Linux kernel contains a bug in the per‑CPU page allocator that occurs when SMP is disabled (SMP=n). In this configuration a spinlock trylock can fail inside a critical section, causing corruption of the per‑cpu page allocator structure. This corruption can lead to kernel crashes or, if successfully exploited, compromise kernel integrity by a malicious user with local access.
Affected Systems
All Linux kernel releases that include the code paths vulnerable to SMP=n, specifically the 6.19 series from release candidate 1 through 8 and the 6.2 series and earlier. The problem is present in any configuration where the kernel was built with SMP disabled.
Risk and Exploitability
The vulnerability has a CVSS score of 7.8 (High) and an EPSS score of less than 1%, indicating low probability of exploitation in the wild at this time. It is not listed in the CISA KEV catalog. Exploitation would require local access and would likely involve triggering a kernel crash or manipulating kernel memory. The attack vector is therefore limited to environments where the system is configured without SMP and an attacker can execute privileged code.
OpenCVE Enrichment
Debian DLA
Debian DSA