Impact
A data‑race vulnerability exists in the Linux kernel’s XDP devmap handling on PREEMPT_RT builds. Concurrent access to the per‑CPU xdp_dev_bulk_queue can cause double‑free, use‑after‑free, and queue corruption during frame transmission. These conditions can corrupt kernel memory, crash the system, and may enable an attacker to gain higher privileges or cause a denial of service.
Affected Systems
All Linux kernel installations compiled with PREEMPT_RT support. The flaw affects the XDP devmap interface used for high‑performance packet handling. No specific kernel version is listed, but the fix is integrated in the latest kernel source that includes the NICS commit referenced in the advisory.
Risk and Exploitability
The CVSS score of 7 indicates high severity, while the EPSS score of less than 1% suggests low likelihood of exploitation. The vulnerability is not listed in the CISA KEV catalog. Exploitation would require race conditions on the same CPU, typically involving concurrent XDP traffic processing, and is likely limited to local or privileged attackers who can control XDP programs.
OpenCVE Enrichment