Impact
The octeontx2-af CGX driver allocates RX/TX flow‑control bitmaps during initialization but fails to free them during exit, causing a persistent memory leak that is reported by the kernel’s kmemleak detector. This leak means that each time the driver is unbound and rebound, 16-byte objects remain resident in memory, potentially leading to gradual exhaustion of available kernel memory and eventual degradation of kernel operations or system instability.
Affected Systems
The vulnerability affects the octeontx2-af CGX driver component within the Linux kernel. No specific kernel release or version information is provided in the data, so any instance of this driver on a Linux system may be impacted.
Risk and Exploitability
Because the defect is triggered only when the driver is unbound and rebound, the attack vector is local and requires the ability to load or unload the driver. The EPSS score is not available and the CVE is not listed in CISA KEV, indicating that there are no known public exploits at this time. The vulnerability can lead to a denial‑of‑service scenario through memory exhaustion but does not provide an execution path for arbitrary code. The risk is moderate, with the primary concern being potential instability from unbounded memory usage.
OpenCVE Enrichment