Impact
The Linux kernel’s drm/vmwgfx driver contains a flaw that overwrites a KMS surface dirty tracker each time a surface is refreshed, discarding otherwise freed memory and causing a memory leak. This gradual exhaustion of system RAM can lead to instability or crashes, effectively denying service. Based on the description, the likely attack vector is a local process that can invoke vmwgfx operations, such as a privileged user or graphics application.
Affected Systems
Affected systems include any Linux kernel that incorporates the vmwgfx DRM module and has not yet received the upstream fix. The vulnerability applies broadly across distributions that ship the default kernel build with the vmwgfx driver, regardless of specific release version, until a patched kernel is installed.
Risk and Exploitability
Formal CVSS or EPSS metrics are not available, so a precise numerical risk assessment cannot be provided. The weakness requires local access to the graphics driver, suggesting that privilege escalation or local persistence may be necessary for exploitation. Once the memory threshold is surpassed, the impact is a denial of service through RAM exhaustion. The vulnerability is not listed in the CISA KEV catalog and does not provide privilege escalation or remote code execution. Therefore, the exploitation risk is considered moderate, with a clear path to denial of service under favorable conditions.
OpenCVE Enrichment