Impact
The vulnerability is a kernel regmap leak that occurs when a device driver’s probe fails or is deferred. Allocated regmap resources are not freed, which can cause kernel memory exhaustion over time. The primary impact is resource exhaustion that can degrade system performance or cause out‑of‑memory conditions, potentially leading to denial of service for the affected system.
Affected Systems
All Linux kernel builds are potentially affected, as the issue is located in the generic mmio regmap infrastructure used by mux drivers. No specific kernel release or version is listed, so any kernel configuration that includes this driver may be vulnerable.
Risk and Exploitability
The CVSS and EPSS scores are not published, and the vulnerability is not listed in CISA’s KEV catalog. Because the defect occurs inside the kernel during driver probe, it requires privileged kernel execution to trigger and is unlikely to be exploitable from user space. The risk is therefore limited to scenarios where an attacker can influence device loading or driver failure conditions, allowing potential memory exhaustion over time and a low‑to‑moderate likelihood of successful exploitation.
OpenCVE Enrichment