Impact
The kernel bug causes a reference count to leak when running certain BPF programs with XDP using the test run interface. This leads to an unmanaged increase in kernel memory and pointer references, which over time can exhaust resources and destabilize the system. The flaw is a classic resource leak and does not directly grant arbitrary code execution or privilege escalation, but it can degrade availability if exploited repeatedly.
Affected Systems
All Linux kernel releases are listed in the CPE data; the vulnerability was identified in early 6.19 release candidates (rc1‑rc5). Any system using those kernels or earlier ones until the fix was integrated is potentially impacted. The patch is part of the mainline kernel; administrators should verify that their kernel build includes the commits that resolve the leak.
Risk and Exploitability
The CVSS score of 5.5 indicates moderate severity, while an EPSS score under 1% implies a low likelihood of exploitation in the wild. Based on the description, it is inferred that using the BPF_PROG_TEST_RUN interface typically requires elevated privileges such as root or CAP_SYS_ADMIN. Because the bug involves kernel reference counters, concluding that unprivileged users would not be able to exploit it directly requires inference; the CVE description does not state this explicitly. The bug is not currently listed in the CISA KEV catalog, further reducing its prominence as a target for adversaries.
OpenCVE Enrichment
Debian DLA
Debian DSA