Impact
The vulnerability is a race condition in the Linux kernel's networking stack that allows concurrent reads and writes of the socket state pointers sk->sk_data_ready and sk->sk_write_space. This can lead to undefined kernel behaviour, including packet loss, crashes, or malformed socket state. The description indicates that the fix introduces READ_ONCE/WRITE_ONCE annotations for UDP, TCP and AF_UNIX to prevent the race. The CVSS score of 3.3 reflects a low impact and damage potential limited to kernel stability rather than immediate data exfiltration or privilege escalation.
Affected Systems
All Linux kernel installations that include the affected code paths – essentially any kernel that uses the networking drivers for UDP, TCP or UNIX domain sockets and has not applied the data‑race fix. No specific patch versions are listed, so all affected kernels should be upgraded to a version that includes the updated READ_ONCE/WRITE_ONCE annotations.
Risk and Exploitability
The CVSS rating of 3.3 and an EPSS score of less than 1 % suggest that exploitation is unlikely in the wild. The vulnerability does not appear in the KEV catalog, and no public exploit has been disclosed. The likely attack vector is a local or privileged user manipulating network traffic to trigger concurrent access to the socket pointers, though the description does not confirm an active exploit path. Mitigation is therefore to apply the patch rather than relying on monitoring.
OpenCVE Enrichment