Impact
The Linux kernel liquidio driver allocates a network device but defers storing its pointer until queue configuration calls. If queue setup fails, the allocated structure is not freed because cleanup expects the pointer to be set. This results in a kernel memory leak that can accumulate over time and eventually exhaust kernel memory, leading to system instability or a denial of service.
Affected Systems
The flaw resides in the liquidio networking driver of the Linux kernel. Any kernel release that incorporates this driver and contains the affected code path is potentially vulnerable. No specific version range is provided, so administrators should verify whether their kernel contains the commit that addresses the issue.
Risk and Exploitability
The vulnerability carries a moderate severity rating. Exploitation would likely require local or elevated privileges to trigger the faulty device setup, such as manipulating NIC configuration. The attack surface is limited to the kernel; there is no arbitrary code execution path. The low probability of public exploitation and absence from known exploited catalogs suggest a lower likelihood of immediate risk, but repeated failures can lead to resource exhaustion.
OpenCVE Enrichment