Impact
A defect in the Linux PCI endpoint driver causes delayed work to run after the driver has torn down hardware resources, leading to an invalid memory access and a kernel oops. The crash results in a system halt, denying availability of the system.
Affected Systems
The vulnerability exists in the Linux kernel’s PCI firmware endpoint for NTB devices. Any Linux installation that includes the epf_ntb driver prior to the patch is affected; the specific kernel version affected is not listed, so all kernels containing the vulnerable code are at risk.
Risk and Exploitability
The CVSS score is 5.5, but the vulnerability is not listed in CISA KEV, and the EPSS score is less than 1%, indicating a very low current exploitation probability. The attack likely requires local privilege or an ability to manipulate the PCI endpoint to trigger the delayed work, so exploitation is possible but not trivial. Because the flaw results in a crash rather than code execution, the primary impact is a denial of service.
OpenCVE Enrichment
Debian DSA