Impact
The Linux kernel driver idpf fails to allocate vdev_info when a virtual port does not have RDMA enabled, yet treats the information as if it were present. Unplugging an auxiliary device on such a virtual port leads to a null pointer dereference during cleanup, resulting in a kernel crash and a denial‑of‑service condition. The weakness is a classic NULL pointer dereference (CWE‑476) that can be triggered locally by an attacker who can cause the device to be unplugged. The likely attack vector is local, as the fault is triggered by manipulating the device unplug process.
Affected Systems
Linux kernel for all distributions that ship the unpatched idpf driver version. The vulnerability applies to every Linux kernel using the affected code and has RDMA‑unsupported vports, however no specific versions are listed.
Risk and Exploitability
CVSS score 7.0 indicates high severity. EPSS is below 1 %, showing that exploitation is considered unlikely at present. The vulnerability is not listed in CISA’s KEV catalog. Exploitation requires local access to trigger unplugging of the auxiliary device on a vport lacking RDMA support; therefore the risk is confined to local attackers who can manipulate the driver. Because the flaw results in a kernel crash, the impact is denial of service rather than privilege escalation.
OpenCVE Enrichment