Impact
The vulnerability allows a userspace application to create an unlimited number of rfkill events in the Linux kernel, which can exhaust kernel memory and trigger an out‑of‑memory situation. This uncontrolled resource consumption corresponds to CWE‑770 and can degrade system stability by consuming critical kernel memory.
Affected Systems
All Linux kernel implementations are affected because the bug exists before the patch. The Common Platform Enumeration strings cover kernels from 2.6.31 through multiple 7.0 release candidates, indicating a broad impact across legacy and current kernel versions.
Risk and Exploitability
The CVSS score of 5.5 indicates moderate severity, and the EPSS score of less than 1% suggests low current exploitation likelihood. The vulnerability is not listed in the CISA KEV catalog. The likely attack vector is local: a process with write access to the rfkill interface can repeatedly issue event creation commands, and the kernel previously accepted an unlimited number. After the patch, the index of pending events is bounded at a large number (1000) to prevent abuse. Because the bug requires interaction with the rfkill subsystem, users with sufficient permissions or access to the userspace rfkill utilities can trigger the issue prior to patching.
OpenCVE Enrichment
Debian DLA
Debian DSA