Impact
The vulnerability involves a data race and potential load/store tearing in the Linux kernel's rxrpc module. Concurrent reads and writes to the last_tx_at field can produce inconsistent values, and on 32‑bit architectures, the 64‑bit value may tear, resulting in inaccurate timing data. This can lead to incorrect keep‑alive packet decisions, potentially causing subtle timing errors or availability issues but does not provide direct control over the system.
Affected Systems
Affected systems are Linux kernels that include the rxrpc implementation. The known affected range covers kernel version 6.19 release candidates 1 through 6, as indicated by the CPE entries, and any future kernels that have not yet incorporated the patch.
Risk and Exploitability
The CVSS score of 4.7 indicates low severity. EPSS is below 1%, and the vulnerability is not flagged in the CISA KEV catalog, suggesting a low likelihood of exploitation. The attack vector is likely local and indirect; an attacker would need to influence the kernel’s rxrpc timing logic, which is not trivial. Overall risk remains low with minimal impact on confidentiality or integrity.
OpenCVE Enrichment