Impact
The kernel contains a flaw in the idpf device driver where the PREEMPT_RT raw/bh spinlock is nested incorrectly during asynchronous virtual channel handling. This causes an invalid wait context that can trigger kernel panics or other unstable behavior. The issue is a concurrency control defect (CWE-833) that threatens system integrity by allowing a chaining of lock acquisitions that violates the expected lock ownership rules.
Affected Systems
All Linux kernel releases that ship the idpf driver, including generic kernel builds as well as the 6.9 release and the 7.0 series from release candidates rc1 through rc7. The vulnerability is generic to any kernel configuration that enables PREEMPT_RT and loads the idpf module.
Risk and Exploitability
The CVSS score of 5.5 indicates a moderate severity, and the EPSS score of less than 1% reflects a very low probability of exploitation under current data. The vulnerability has not been added to the CISA KEV catalog, implying no known exploitable variants. Attackers would need local kernel execution or privileged access to trigger the problematic spinlock sequence, and there are no publicly known exploitation techniques beyond provoking a crash. The impact is limited primarily to service interruption rather than data theft or privilege escalation.
OpenCVE Enrichment
Debian DSA