Impact
An issue in the Linux kernel's mtk-smi driver caused reference leaks when the driver was probed later in the boot process or unbound. The flaw meant that a reference to the SMI device was not dropped, leading to memory consumption growing without bound and the risk of device corruption after the driver unloads. The patch ensures that the reference is released correctly, preventing uncontrolled memory usage.
Affected Systems
The vulnerability applies to any Linux kernel release that includes the mtk-smi driver prior to the fix. No specific version numbers are provided, so all affected kernels that have not incorporated the patch are at risk.
Risk and Exploitability
The EPSS score is not available and the issue is not listed in CISA KEV, indicating no known widespread public exploitation. However, kernel reference leaks can lead to memory exhaustion and a denial of service if an attacker can trigger probe deferral or driver unbinding. The CVSS score is not supplied, so the precise severity cannot be quantified from the data.
OpenCVE Enrichment