Impact
A race condition in the Linux kernel’s XDP bulk queue handling on PREEMPT_RT enabled systems allows concurrent tasks to manipulate the per‑CPU queue while a flush operation is in progress, causing double list deletions and pointer dereferences that trigger a kernel panic. This flaw, identified as CWE‑367, results in a local denial of service through a kernel crash.
Affected Systems
Linux kernels compiled with the PREEMPT_RT patch are affected if the per‑CPU lock for the XDP bulk queue has not been applied. Older kernel versions running in this configuration are vulnerable until the fix is incorporated.
Risk and Exploitability
The EPSS score for this vulnerability is reported as less than 1 % and it is not listed in the CISA KEV catalog, indicating a low likelihood of exploitation. The attack requires local access to a PREEMPT_RT system and the presence of multiple tasks using the XDP bulk queue on the same CPU; no remote or privilege‑escalation vector exists, limiting the risk to local denial of service.
OpenCVE Enrichment