Impact
The vulnerability is a memory leak in the ice network device driver that occurs during ring parameter configuration. When allocation of rx rings fails or a ring setup fails, the driver fails to free previously allocated tx and xdp rings, causing memory to remain allocated in kernel space. This uncontrolled memory consumption can lead to kernel memory exhaustion, potentially resulting in a denial of service or degraded performance. The weakness is a code/resource deallocation problem (CWE‑763).
Affected Systems
All Linux kernels that include the vulnerable ice driver code, such as the mainline kernel series prior to the application of the fix. The issue affects drivers for Intel’s ICE network interface controller. No explicit version boundaries are supplied in the advisory, so any kernel with the unpatched code is potentially affected.
Risk and Exploitability
The CVSS score of 5.5 indicates moderate severity, and the EPSS score below 1 % shows a low probability of exploitation. The vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog. Exploitation requires privilege to invoke ice_set_ringparam, which is generally accessible to processes with sufficient capabilities or root. The likely attack path therefore appears to be a local privilege or kernel‑module escalation scenario rather than a remote trigger. Given the moderate score, low exploit likelihood, and the fact that the defect relates only to resource management, the overall risk remains moderate, but can pose a denial‑of‑service threat under sustained abuse.
OpenCVE Enrichment