Impact
This vulnerability occurs when the idpf driver initializes in the Linux kernel. The driver ignores the return value from register_netdev(), meaning that if the network device registration fails, the error is silently dropped. During driver removal, an attempt to unregister a non‑existent device triggers a WARN_ON() warning, and because the failure was masked, users see no indication that the netdev creation had failed. The flaw therefore leads to diagnostic warnings and, in repeated or uncontrolled scenarios, could potentially destabilize the kernel, but it does not provide direct access to data or remote code execution.
Affected Systems
The issue affects all Linux kernels that include the idpf driver, which is used for Intel Data Plane Framework network adapters. Any distribution kernel that incorporates this driver before the fix is susceptible. No specific version range is specified, so all kernel releases predating the patch are considered vulnerable.
Risk and Exploitability
The CVSS score of 5.5 indicates moderate severity, and the EPSS score is reported to be less than 1%, implying a low probability of exploitation in the wild. The vulnerability is not listed in the CISA KEV catalog. While the CVE description does not explicitly state the attack vector, based on the fact that the flaw is triggered during driver initialization or removal, it is inferred that local privileged access would be required to load or unload the idpf module. Consequently, the exposure is limited to the local system and does not enable remote exploitation.
OpenCVE Enrichment
EUVD
Ubuntu USN