Impact
The flaw causes a lingering reference to an Intel thermal management device after the device is opened successfully. This results in a memory leak that can gradually consume kernel memory and degrade system performance or cause a reboot. The vulnerability presents no direct privilege escalation or remote code execution risk, but an attacker local to the system could trigger the leak repeatedly to exhaust resources. The weakness is identified as a memory leak.
Affected Systems
Linux kernel versions before the fix in the 6.19 series, particularly early release candidates of 6.19, are impacted. Vendors that include the Intel thermal management driver in their kernel build are affected. The precise version range is not enumerated beyond the 6.19 release series, but any kernel prior to the commit that addresses the leak qualifies.
Risk and Exploitability
The CVSS score of 5.5 indicates a moderate impact. The EPSS score is below 1%, suggesting a low probability of exploitation in the wild. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires local access to the kernel and the ability to open the Intel thermal management device repeatedly; no remote attack vector is apparent. The risk is primarily to availability rather than confidentiality or integrity.
OpenCVE Enrichment
Debian DLA
Debian DSA
Ubuntu USN