Impact
The flaw resides in the Linux kernel’s DPLL subsystem, where duplicate attempts to register the same pin with identical operations, private data, and cookie are silently accepted. The first registration creates a pin registration object; each subsequent identical call merely increments a reference count. When the first unregistration releases the object, the remaining references become invalid, causing kernel WARN messages on later unregistrations. The result is inconsistent resource accounting and visible kernel warnings, but no direct crash or code execution path.
Affected Systems
Linux kernel versions that include the buggy DPLL registration logic, specifically kernel 6.19 and its release candidates up to rc6, are affected. All distributions shipping these kernel releases, until the security patch that implements duplicate‑registration rejection is applied, are potentially impacted.
Risk and Exploitability
The CVSS score of 5.5 indicates moderate severity, while the EPSS score of less than 1% reflects a very low likelihood of exploitation. The vulnerability is not listed in CISA's KEV catalog, and no public exploits are known. Exploitation would require a local process with privileges sufficient to invoke the DPLL registration API, and the worst outcome would be kernel WARN messages and potential instability rather than remote code execution or privilege escalation.
OpenCVE Enrichment