Impact
A defect in the TI K3 SOC info driver for the Linux kernel fails to release a regmap that is allocated during driver probe. The memory and device resource associated with that regmap is never freed when the probe fails, creating a persistent leak. This leak can accumulate over repeated failures, potentially exhausting kernel memory or device‑register space and causing system instability or a denial of service. The weakness corresponds to improper resource management and is categorized as CWE‑772.
Affected Systems
All Linux kernel builds that include the TI K3 SOC info driver are susceptible, regardless of kernel version, until the vendor incorporates the fix. No specific product version boundary is listed; any kernel running the unpatched driver may be affected.
Risk and Exploitability
The vulnerability is local in nature: an attacker with privileged access can force multiple probe failures or trigger the driver’s probe routine to make the memory leak occur. Because the exploit requires kernel intervention rather than remote network access, the immediate threat level is moderate, but repeated use can degrade availability over time. The EPSS score is not available and the issue is not listed in the CISA KEV catalog, indicating no known active exploitation yet. The recommended remedy is to apply the kernel patch that switches to a device‑managed allocator so that regmaps are released automatically on failures or unbinding.
OpenCVE Enrichment