Description
In the Linux kernel, the following vulnerability has been resolved:

net: liquidio: Fix off-by-one error in PF setup_nic_devices() cleanup

In setup_nic_devices(), the initialization loop jumps to the label
setup_nic_dev_free on failure. The current cleanup loop while(i--)
skip the failing index i, causing a memory leak.

Fix this by changing the loop to iterate from the current index i
down to 0.

Also, decrement i in the devlink_alloc failure path to point to the
last successfully allocated index.

Compile tested only. Issue found using code review.
Published: 2026-03-18
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Memory Leak leading to resource exhaustion
Action: Apply Patch
AI Analysis

Impact

An off‑by‑one error in the Linux kernel’s liquidio driver causes the cleanup routine to skip the last allocated network device when failure occurs, which results in a memory leak. Over time the unreleased memory accumulates, potentially exhausting system memory and degrading kernel performance. While the advisory does not confirm a direct denial of service, the leakage could impinge on overall system stability if the condition repeats.

Affected Systems

The flaw exists in the pool‑fabric (PF) support of the liquidio network driver within the Linux kernel. The advisory does not specify which kernel releases are affected; however, any kernel build that did not incorporate the referenced patch commit remains vulnerable. Administrators should review their kernel version against the commit list linked in the references to determine eligibility for the fix.

Risk and Exploitability

The CVSS score of 5.5 indicates moderate severity, and the EPSS score of less than 1% suggests a low likelihood of exploitation. Because the bug resides in code executed during device initialization, the attack vector is inferred to be local with privileged kernel access. No public exploit is documented, and the vulnerability is not present in the CISA KEV catalog, which collectively limits immediate threat but still warrants timely mitigation to avoid potential resource exhaustion.

Generated by OpenCVE AI on March 27, 2026 at 11:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply a kernel update containing the liquidio off‑by‑one fix shown in the referenced commit logs.
  • Reboot the system after the update to reload the driver.
  • Verify the running kernel version to confirm the presence of the fix.
  • Monitor system memory and network device activity for signs of continued leaks.
  • If an update is unavailable, consider disabling the liquidio interface or restricting privileges that trigger device allocation until a patch is applied.

Generated by OpenCVE AI on March 27, 2026 at 11:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 27 Mar 2026 20:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-772

Fri, 27 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-401
CWE-665

Fri, 27 Mar 2026 08:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-401
CWE-665

Thu, 26 Mar 2026 14:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-401

Thu, 26 Mar 2026 12:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-401

Wed, 25 Mar 2026 22:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-193
CWE-401

Wed, 25 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-193
CWE-401

Wed, 25 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-401

Tue, 24 Mar 2026 13:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-401

Thu, 19 Mar 2026 00:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}

threat_severity

Moderate


Wed, 18 Mar 2026 18:00:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: net: liquidio: Fix off-by-one error in PF setup_nic_devices() cleanup In setup_nic_devices(), the initialization loop jumps to the label setup_nic_dev_free on failure. The current cleanup loop while(i--) skip the failing index i, causing a memory leak. Fix this by changing the loop to iterate from the current index i down to 0. Also, decrement i in the devlink_alloc failure path to point to the last successfully allocated index. Compile tested only. Issue found using code review.
Title net: liquidio: Fix off-by-one error in PF setup_nic_devices() cleanup
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-03-18T17:41:04.078Z

Reserved: 2026-01-13T15:37:45.990Z

Link: CVE-2026-23257

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-18T18:16:23.997

Modified: 2026-03-19T13:25:00.570

Link: CVE-2026-23257

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-03-18T00:00:00Z

Links: CVE-2026-23257 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-03-27T15:48:22Z

Weaknesses