Impact
In Linux kernel's ftgmac100 network driver, ring allocation routine could leak memory when opening the device fails. The driver allocates several resources—rx_skbs, tx_skbs, rxdes, txdes, and rx_scratch—in stages. On intermediate failures, the function returned -ENOMEM without freeing previously allocated memory, leading to a resource leak (CWE‑401). This leak can grow with repeated failures, potentially exhausting kernel memory and causing a denial of service.
Affected Systems
The vulnerability affects the ftgmac100 driver in the Linux kernel, which is used in devices that provide an Ethernet interface via the FTG MAC100 hardware. Any system running a kernel version that contains the unpatched ftgmac100 implementation, regardless of vendor, is potentially impacted. The precise version range is not specified but the fault was addressed in a commit that updates the kernel source.
Risk and Exploitability
The CVSS score is not provided and the EPSS score is unavailable, so an exact severity rating cannot be given. However, the criticality stems from the possibility of gradual memory exhaustion if an attacker can repeatedly trigger the faulty open path. Since the flaw is in the kernel driver, local or privileged users who can force the device to open or unload the driver have the most direct means to exploit it. Because the issue is a resource leak rather than an immediate privilege escalation or code execution, the risk is more about availability than confidentiality or integrity. The vulnerability is not listed in the CISA KEV catalog, suggesting no publicly known exploits yet.
OpenCVE Enrichment
Debian DLA
Debian DSA