Impact
A memory leak was discovered in the vc4 driver of the Linux kernel. When the function that captures a hang state returns early, a previously allocated kernel memory block is never freed. If this path is triggered repeatedly, memory used by the driver can grow without bound, eventually exhausting system resources and causing the kernel to become unresponsive or crash. The vulnerability does not provide direct control over data or code execution, but it enables a local attacker to degrade or deny service by repeatedly inducing the leak.
Affected Systems
Any Linux system that includes the vc4 DRM driver in its kernel is affected. The vendor designation is Linux, and no specific kernel version range is provided in the available data, so all kernels that contain the unpatched code before the recent commit should be considered vulnerable.
Risk and Exploitability
The EPSS score is unavailable and the vulnerability is not listed in the CISA KEV catalog, suggesting that no widespread exploitation has been observed yet. Because the flaw requires interacting with the Vulkan or DRM subsystem to trigger the kernel path that leaks memory, the attack vector is likely a local privilege escalation or user-level kernel activity on systems with the VC4 driver enabled. While the CVSS score is not given, the potential impact of resource exhaustion means that, if exploited, the vulnerability could lead to a denial of service for legitimate users.
OpenCVE Enrichment