Impact
The vulnerability manifests as a deadlock that occurs when the kernel handles the ethtool ‑x command for the SFC (Solarflare) driver. During the configuration read the net_device rss_lock is held by the core routine, yet driver code attempts to lock it again. This double‑lock situation can cause the kernel to stall, potentially freezing network operations and impacting system availability. The weakness is identified as a deadlock (CWE‑667).
Affected Systems
All Linux kernel builds that include the SFC driver prior to the patch, notably the 6.19 release candidates (rc1 through rc7) and any derivative kernels that use the same code path. No CVE‑specific version number is listed beyond the rc range, so any kernel compiled from sources before the provided commit may be vulnerable.
Risk and Exploitability
The CVSS score of 5.5 indicates a medium severity. The EPSS score is below 1%, suggesting a very low probability of exploitation in the wild. The vulnerability is not in the CISA KEV catalog, further implying limited current exploitation. Triggering the ethtool ‑x command could induce the deadlock, resulting in service disruption rather than a traditional remote code execution. The risk remains moderate but is mitigated by the low exploitation likelihood.
OpenCVE Enrichment