Impact
The vulnerability is a data race in the Linux kernel bonding driver involving the fields slave->last_rx and slave->target_last_arp_rx. These variables can be read and written without lock protection, leading to inconsistent state when accessed concurrently. The patch introduced READ_ONCE() and WRITE_ONCE() annotations to clarify the intended access pattern. Based on the description, it is inferred that if the race occurs it may lead to kernel‑level inconsistencies, but no definitive impact such as denial of service or information disclosure is stated.
Affected Systems
This vulnerability affects the Linux kernel bonding driver across all distributions using the Linux kernel, particularly versions of the 6.19 release candidate series (rc1 through rc7) that have not yet incorporated the patch. The issue stems from lockless access to the slave->last_rx and slave->target_last_arp_rx fields. All kernel builds that include the bonding module before the patch are potentially affected.
Risk and Exploitability
The CVSS score of 4.7 indicates a moderate impact; the EPSS probability is below 1%, suggesting a very low likelihood of exploitation. The vulnerability is not listed in CISA's KEV catalog. Based on the description, it is inferred that the race can be triggered by a concurrency condition during packet processing on a bonded interface. The CVE does not provide a confirmed exploitation vector; the only evidence is a KCSAN data‑race report. The risk is mainly the potential for subtle kernel inconsistencies rather than a direct security breach.
OpenCVE Enrichment