Impact
This vulnerability resides in the Linux kernel’s DMA engine (idxd) subsystem and involves an incorrect completion of DMA descriptors during the llist_abort_desc() operation. The logic error causes the loop to complete the wrong descriptor, which can result in a NULL pointer dereference, double completion of a descriptor, or leakage of descriptors that are still in use. These flaws can destabilize the kernel, trigger a crash, or cause the DMA engine to misbehave, leading to unresponsive or halted services.
Affected Systems
The flaw affects the Linux kernel; the CNA entry lists "Linux:Linux" with no specific versions provided. Based on the description, it is inferred that any kernel build containing the idxd driver before the patch is vulnerable. System administrators should review the kernel version in use and determine if it predates the commit that fixes the bug.
Risk and Exploitability
The CVSS score is 9.8, and the EPSS indicates a low exploitation probability (<1%). The vulnerability is not listed in CISA’s KEV catalog, indicating no publicly known exploit at the time of this assessment. The likely attack vector is a local compromise that can supply malformed or crafted DMA descriptors to the idxd driver, such as a privileged user or a malicious application that can interact with the DMA subsystem. While remote exploitation is unlikely without local access, an attacker who gains sufficient privileges could force a kernel panic or degrade performance, creating a denial‑of‑service window.
OpenCVE Enrichment
Debian DSA