Impact
The vulnerability was a memory leak in the Linux kernel's DRM (drm/xe) subsystem, specifically in the xe_vm_madvise_ioctl handler. When the check_bo_args_are_sane() validation fails, resources allocated for virtual memory areas (VMAs) were not properly freed, leading to a leak. This is a classic example of resource exhaustion (CWE-459). While it does not provide direct code execution, the accumulation of unreleased memory could degrade system performance or culminate in a denial of service.
Affected Systems
The issue affects Linux kernel builds where the drm/xe module is compiled. The impacted binaries are part of the standard Linux kernel (vendor Linux, product Linux). Specific kernel versions are not enumerated in the CVE entry, so any kernel containing the vulnerable code before the fix is susceptible. Administrative users or processes with access to the DRM subsystem could trigger the flaw.
Risk and Exploitability
The CVSS score is 5.5, indicating moderate severity, and the EPSS score is below 1%, suggesting a low probability of exploitation in the wild. The flaw is not listed in CISA's Known Exploited Vulnerabilities catalog. Based on the description, it is inferred that exploitation requires local access, such that a user or process can invoke xe_vm_madvise_ioctl and cause a validation failure. An attacker with local or elevated privileges could use this path to degrade system resources, potentially leading to a service disruption.
OpenCVE Enrichment