Impact
The vulnerability resides in the most_register_interface function of the Linux kernel. When registration fails early, the function returns an error without freeing memory allocated for the device interface, causing a resource leak. This leak can lead to exhaustion of system memory, potentially degrading performance or causing a denial-of-service condition. The flaw is a classic instance of CWE-400: Resource Manipulation or Release.
Affected Systems
All Linux kernel builds that contain the unpatched most_register_interface routine are affected. The patch was introduced in the commit series referenced in the advisory; any kernel version shipped before that commit is vulnerable. No specific version numbers are listed, so the impact applies to all kernels lacking the fix.
Risk and Exploitability
Based on the description, the vulnerability is a memory resource leak that occurs when most_register_interface() fails early and returns an error without freeing allocated memory. The incident does not specify any direct exploitation vector but the leak can accumulate over time, potentially exhausting memory and causing a denial-of-service. The analysis of the risk level is inferred from the nature of memory leaks; a system that repeatedly triggers this error path could suffer memory exhaustion, yet a single occurrence is unlikely to manifest a noticeable impact. Because the issuance includes no active exploitation reports, the EPSS score is not available and the vulnerability is not listed in KEV. The ultimate risk depends on workload characteristics and the likelihood of repeated failure, but no concrete evidence of exploitation is present.
OpenCVE Enrichment