Impact
The vulnerability involves the Linux kernel's cpsw networking driver executing critical callback code without holding the necessary network lock that it normally expects to be held. The removal of the run‑time lock in certain IP multicast operations causes a lock mis‑assumption, which leads to a kernel assertion and stack trace, potentially causing a kernel panic or arbitrary code execution. Thus, a compromised or malicious user can trigger a denial of service or gain elevated privileges by manipulating multicast settings or sending specific IPv6 socket options.
Affected Systems
Legacy versions of the Linux kernel that include the old cpsw driver, particularly on ARM‑based platforms such as the BeagleBone Black using the am335x‑bone driver. Versions prior to the application of the work‑queue patch in the Linux mainline are affected. The vulnerability was identified while reproducing on kernel 6.19.0‑rc7‑next‑20260130‑yocto‑standard+ #35.
Risk and Exploitability
The CVSS score of 7 indicates high severity, but the EPSS score of less than 1% shows a low exploitation probability. The vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog. An attacker would likely need local or privileged access to modify multicast configuration or initiate IPv6 socket options, indicating a local or elevated privilege threat. The impact is a system crash which could be used to facilitate further compromise if a local attacker seeks persistence.
OpenCVE Enrichment