Description
In the Linux kernel, the following vulnerability has been resolved:

drm/vmwgfx: Don't overwrite KMS surface dirty tracker

We were overwriting the surface's dirty tracker here causing a memory leak.
Published: 2026-04-03
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Memory Leak via Overwritten KMS Surface Dirty Tracker
Action: Apply Patch
AI Analysis

Impact

The vulnerability originates in the DRM/VMwgfx driver of the Linux kernel where the surface dirty tracker is overwritten, leading to a memory leak. This leak can gradually consume memory resources, potentially degrading system performance or causing a local denial of service if the kernel’s memory pressure reaches critical levels. The weakness is described by CWE-911, indicating a logical flaw that leads to memory corruption and loss of integrity.

Affected Systems

All Linux kernel distributions that have not yet incorporated the hot‑fix commit for the vmwgfx driver are susceptible. The issue is present in the kernel source tree as of the references provided and will affect any system running a kernel that includes the buggy code without the later patch.

Risk and Exploitability

The CVSS score of 5.5 reflects a moderate risk, and the EPSS score of less than 1% indicates a low probability of exploitation in the wild. The vulnerability is not listed in the CISA KEV catalog. Exploitation would likely require local or privileged access to trigger the leak, and the impact is primarily resource exhaustion rather than remote code execution.

Generated by OpenCVE AI on April 7, 2026 at 09:25 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Linux kernel to a version that includes the vmwgfx patch from commit 354c8bbf8d1e4aa61e580dbe160591feda504e4f or later.
  • Verify the applied patch by checking the commit identifiers in the provided source URLs.
  • Monitor system memory usage for abnormal growth, especially in servers running graphics workloads.
  • If an update cannot be performed immediately, consider rebooting affected systems to release leaked memory until a patched kernel is available.

Generated by OpenCVE AI on April 7, 2026 at 09:25 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 23 Apr 2026 21:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-401
CPEs cpe:2.3:o:linux:linux_kernel:6.16:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:*

Tue, 07 Apr 2026 08:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-401

Sat, 04 Apr 2026 01:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-911
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}

threat_severity

Low


Fri, 03 Apr 2026 21:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-401

Fri, 03 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: drm/vmwgfx: Don't overwrite KMS surface dirty tracker We were overwriting the surface's dirty tracker here causing a memory leak.
Title drm/vmwgfx: Don't overwrite KMS surface dirty tracker
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-04-13T06:07:18.141Z

Reserved: 2026-01-13T15:37:46.016Z

Link: CVE-2026-23430

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2026-04-03T16:16:24.357

Modified: 2026-04-23T21:03:36.690

Link: CVE-2026-23430

cve-icon Redhat

Severity : Low

Publid Date: 2026-04-03T00:00:00Z

Links: CVE-2026-23430 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-08T19:54:08Z

Weaknesses