Impact
The kernel driver for idxd devices incorrectly fails to free the workqueue that is created during the device’s lifecycle. This omission means that the workqueue remains allocated even after the device object has been released, causing a resource leak within the kernel. If the leak persists, it can consume kernel memory, prevent further workqueue allocations, and potentially lead to system instability or service interruptions. The core weakness is improper resource deallocation, classifiable as a resource leak flaw (CWE‑391).
Affected Systems
All Linux kernel deployments that include the idxd DMA engine for DSA/IAA devices are affected. The issue is present wherever the kernel builds include the idxd driver; it is not limited to a specific vendor or version beyond the Linux kernel itself. If a system uses a custom kernel that omits the patch, the same risk applies.
Risk and Exploitability
The vulnerability lacks an accessible exploit vector in its public description, and no EPSS score or KEV listing is reported. However, because it manifests at the kernel level, a local account with sufficient privileges to add or remove DSA/IAA devices could trigger the leak. The absence of an EPSS or KEV indication suggests that widespread exploitation has not been observed yet, but the potential for denial of service exists if the kernel allocates workqueues until exhaustion. The risk is therefore moderate to high, especially in environments that frequently manage idxd devices.
OpenCVE Enrichment