Impact
The vulnerability exposes a buffer leak in the Linux kernel’s eXpress Data Path (XDP) socket (xsk) fragment handling. A node removed from the packet buffer pool list was not re‑initialized, causing the free‑list test to fail and preventing the buffer from being added back to the pool. This results in incrementally increasing memory usage as buffers are leaked. The weakness is a classic buffer leak, classified as CWE‑909, and can lead to degraded system performance or denial of service if the leak is exploited extensively.
Affected Systems
The flaw affects all Linux kernel releases that include the flawed xsk fragment handling logic prior to the commit that replaces list_del() with list_del_init(). Users of any distribution’s kernel that has not been updated to include this patch are vulnerable. The issue applies to kernel components associated with network packet handling and XDP socket (xsk) buffers. No specific vendor version numbers are listed; any kernel version lacking the patch is susceptible.
Risk and Exploitability
The CVSS score of 5.5 indicates a moderate impact, and the EPSS score of less than 1% suggests a low probability of exploitation. The flaw is not currently listed in the CISA KEV catalog. While the description does not state an explicit attack vector, the nature of the bug implies that an attacker would need to trigger the XDP fragment handling path—likely by sending a large number or specially crafted packets to a network interface configured for xsk. This inference points to a local or network‑based denial of service risk rather than remote code execution.
OpenCVE Enrichment