Impact
The vulnerability exists in the Linux kernel's accel/rocket driver. During initialization, if rocket_core_init() fails, the error path incorrectly fails to decrement a counter and remove the rocket DRM device, leading to out-of-bounds accesses. This incorrect resource cleanup can corrupt kernel memory, potentially causing system crashes or privilege escalation.
Affected Systems
The affected product is the Linux kernel across all distributions. The CPE indicates cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*. No specific vendor product versions are listed; the issue is present in any kernel build containing the rocket driver before the patch commit.
Risk and Exploitability
The CVSS score is not provided, but the EPSS score is below 1% and the vulnerability is not listed in the CISA KEV catalog, suggesting a low overall likelihood of exploitation. The flaw requires the driver to be loaded and for an error condition (such as EPROBE_DEFER) to occur, so the attack vector is largely local and dependent on kernel execution context.
OpenCVE Enrichment