Impact
In the Linux kernel’s framebuffer console (fbcon) subsystem, the routine fbcon_open() may call con2fb_acquire_newinfo() and fail, yet the failure is not checked. Consequently, the fbcon_par structure pointer remains NULL and is later dereferenced, causing a null pointer dereference and a kernel panic. This leads to a denial of service by forcing the device to reboot or halt. The weakness corresponds to CWE-476: NULL Pointer Dereference.
Affected Systems
The vulnerability affects all Linux kernel versions prior to the inclusion of the mentioned patch; no specific version range is provided in the data. System administrators should verify that their kernel does not contain the vulnerable fbcon code path.
Risk and Exploitability
The EPSS score is not available and the vulnerability is not listed in KEV, but a kernel panic is a severe outcome. The likely attack vector is local access that can trigger a console or framebuffer operation, such as a user opening a framebuffer device or the system initiating a console switch. A local attacker with sufficient privilege to invoke con2fb_acquire_newinfo() could exploit this flaw. While no CVSS score is provided, the impact of a kernel panic warrants high priority handling.
OpenCVE Enrichment