Impact
The vulnerability originates in the DRM/VMwgfx driver of the Linux kernel where the surface dirty tracker is overwritten, leading to a memory leak. This leak can gradually consume memory resources, potentially degrading system performance or causing a local denial of service if the kernel’s memory pressure reaches critical levels. The weakness is described by CWE-911, indicating a logical flaw that leads to memory corruption and loss of integrity.
Affected Systems
All Linux kernel distributions that have not yet incorporated the hot‑fix commit for the vmwgfx driver are susceptible. The issue is present in the kernel source tree as of the references provided and will affect any system running a kernel that includes the buggy code without the later patch.
Risk and Exploitability
The CVSS score of 5.5 reflects a moderate risk, and the EPSS score of less than 1% indicates a low probability of exploitation in the wild. The vulnerability is not listed in the CISA KEV catalog. Exploitation would likely require local or privileged access to trigger the leak, and the impact is primarily resource exhaustion rather than remote code execution.
OpenCVE Enrichment