Impact
A circular locking dependency exists in the RDS TCP implementation of the Linux kernel. The function sk_net_refcnt_upgrade() allocates memory while holding the socket lock, creating a situation where the task can be stalled by another lock, leading to a deadlock. This weakness, classified as CWE-833, can result in a denial‑of‑service condition if the lock order is repeatedly violated.
Affected Systems
All Linux kernel distributions before the commit that introduced the lock fix are affected. The issue has been reported for both the generic Linux kernel and the Linux kernel for Linux-based systems. No specific version range is listed, so any kernel version that has not yet merged the patch is vulnerable.
Risk and Exploitability
The vulnerability carries a score of 5.5, indicating a moderate severity level. The estimated probability of exploitation is less than 1 percent, and it is not currently listed in the known exploited vulnerabilities catalog. The attack is inferred to require traffic that triggers rds_tcp_tune, so it is limited to scenarios where the RDS protocol is in use. While the risk is moderate, it primarily concerns availability rather than confidentiality or integrity.
OpenCVE Enrichment