Impact
A race condition exists in the Freescale QMan (qbman) driver when the QMAN_FQ_FLAG_DYNAMIC_FQID flag is enabled. If a queue is destroyed while another thread concurrently allocates a new queue, the freed FQID can be reassigned before the original table entry is cleared, triggering a WARN_ON check and corrupting the internal fq_table. This behaviour can lead to kernel instability and potentially a denial of service. The underlying weakness is a race condition (CWE‑367).
Affected Systems
All Linux kernel builds that include the Freescale QMan (qbman) driver for queue management are potentially affected. The advisory does not specify a precise kernel version range, so any kernel containing the qman driver prior to the patch could be vulnerable.
Risk and Exploitability
The CVSS score of 5.5 indicates moderate severity, and the EPSS score of less than 1% suggests a low likelihood of exploitation. This vulnerability is not listed in the CISA KEV catalog. The likely attack vector is local or privileged code that can simultaneously destroy and create queues. Based on the description, it is inferred that exploitation would require such conditions, but no public exploit is known.
OpenCVE Enrichment