Impact
The dpaa2-switch driver allocates arrays for ports, FDBs, and filter blocks using kcalloc() with a count derived from the device report. When the hardware reports zero interfaces, kcalloc(0,…) returns a ZERO_SIZE_PTR instead of NULL, and a later unconditional dereference of this pointer inside dpaa2_switch_probe() causes a kernel panic. This results in a complete loss of system availability as the operating system crashes.
Affected Systems
The vulnerability affects any Linux kernel that includes the dpaa2-switch driver, including all 6.19 release candidates (6.19-rc1 through 6.19-rc8) and any later kernel releases that have not yet incorporated the fix. The affected vendor is Linux, product Linux kernel.
Risk and Exploitability
The CVSS score of 5.5 indicates moderate severity. With an EPSS score of less than 1%, the likelihood of exploitation in the wild is low, and the vulnerability does not appear in the CISA KEV catalog. Based on the description, the attack vector is inferred to be local or privileged—an attacker would need to influence the device configuration or supply malformed firmware so that the driver probes with zero interfaces, triggering the crash.
OpenCVE Enrichment
Debian DLA
Debian DSA