Impact
A race condition was discovered in the Linux kernel's MPTCP subsystem when the function mptcp_pm_nl_flush_addrs_doit performs a list splice without the required RCU protection. This flaw allows concurrent access to a shared list, potentially corrupting memory and causing the kernel to crash. The resulting kernel panic effectively denies service on the affected host.
Affected Systems
The vulnerability exists in Linux kernel releases 6.19 release candidates (rc1 through rc7). Any system running one of these kernels without the upstream patch to mptcp_pm_nl_flush_addrs_doit is potentially vulnerable.
Risk and Exploitability
The CVSS score of 7.8 classifies the issue as high severity, but the EPSS of less than 1% indicates that exploitation attempts are currently rare. The risk is not reflected in the CISA KEV catalog. Based on the description, it is inferred that exploitation would likely require interaction with the MPTCP subsystem, possibly through crafted network traffic or local manipulation of MPTCP sockets, leading to a kernel panic and system reboot.
OpenCVE Enrichment
Debian DLA
Debian DSA