Impact
This vulnerability resides in the Linux kernel's rocker driver. When a rocker port is removed, the kernel allocates memory for the port’s private data but fails to free it unless a port_post_fini callback is defined. Because the default rocker_ofdpa_ops implementation does not provide such a callback, each port removal leaks a sizeof(struct ofdpa_port) buffer. Repeated removals can accumulate enough leaked memory to exhaust kernel space, potentially causing a degraded performance or a kernel out‑of‑memory condition.
Affected Systems
All releases of the Linux kernel that contain the unpatched rocker code are affected, including 6.19 RC1 through RC7 and any subsequent kernel versions compiled without this patch. The vulnerability is present in all Linux distributions that ship with the affected kernel code until the fix is applied.
Risk and Exploitability
The CVSS score of 5.5 indicates moderate severity. The EPSS score of less than 1% suggests a low likelihood of current exploitation. The issue requires local, privileged access to manipulate rocker ports, making it a local software vulnerability. It is not listed in CISA’s KEV catalog. An attacker who repeatedly removes and recreates rocker ports could gradually deplete kernel memory, impacting system availability.
OpenCVE Enrichment
Ubuntu USN