Impact
In the Linux kernel, the dpaa2‑switch driver extracts an interface identifier from the upper 16 bits of a hardware status register and indexes into an internal ports array without validating that the identifier is within bounds. Because the if_id value can be any 16‑bit number while the array is sized only to the number of configured interfaces, an out‑of‑bounds read can occur. This flaw may expose kernel memory contents or cause a crash, potentially allowing an attacker to glean sensitive information.
Affected Systems
The vulnerability exists in the Linux kernel’s dpaa2‑switch module. Any kernel containing the unpatched dpaa2‑switch code, regardless of release level, is affected. The issue is not limited to a single kernel version; all builds from the time the code was introduced up to the date of the patch are vulnerable.
Risk and Exploitability
The flaw carries a CVSS base score of 7.0, indicating moderate severity. The EPSS score is under 1 %, reflecting a very low exploitation probability, and the vulnerability is not listed in CISA’s KEV catalog. Exploitation would likely require local or privileged access to a device that triggers the dpaa2‑switch IRQ handler, making it practical mainly for attackers with physical or kernel-level access.
OpenCVE Enrichment
Debian DLA
Debian DSA