Impact
The Linux kernel contains a race condition that can cause a NULL pointer dereference or use‑after‑free when the smc_tcp_syn_recv_sock() routine reads the SMC socket pointer while a concurrent close operation clears it. The flaw is triggered during the TCP three‑way handshake, specifically when SYN packets are processed. This can lead to a kernel panic, denial of service, or if an attacker controls the freed memory, arbitrary code execution with kernel privileges.
Affected Systems
The vulnerability affects all Linux kernel installations that include the SMC (Socket Multi‑Protocol) module and have an SMC listening socket. No specific kernel version list is provided in the source material, so the flaw applies to all kernel versions prior to the application of the described patch.
Risk and Exploitability
Severity is likely high given the potential for kernel crashes or privilege escalation, but CVSS scores are unavailable. EPSS data is not provided, and the issue is not recorded in CISA's KEV catalog. The attack vector is network‑based, requiring the injection of SYN packets toward an SMC listening socket; the race is reproducible by tools such as syzkaller, indicating that the threat is exploitable in practice though no real‑world exploitation reports are cited.
OpenCVE Enrichment