Impact
The vulnerability arises when the function that frees a device resource dereferences a null pointer, causing the kernel to crash. The problematic code is executed during the device release phase, potentially during normal operation or error handling paths. A kernel crash may compromise system availability and could allow further exploitation by a privileged attacker to gain unauthorized control.
Affected Systems
The flaw is present in the Linux kernel itself, with no specific version information provided. All Linux kernel deployments that include the auxdisplay and line-display subsystems are affected until the patch is applied.
Risk and Exploitability
The risk of exploitation is high because a null dereference in kernel space can lead to a denial‑of‑service or crash the entire system. The EPSS score is not available and the vulnerability is not listed in the CISA KEV catalog, but the nature of the bug suggests that an attacker with sufficient privilege to trigger the release path could destabilize the target. The likely attack vector is a local or privileged process that can invoke the problematic release through device removal or error handling paths, and it is inferred that the flaw does not allow remote exploitation without prior privileged execution.
OpenCVE Enrichment