Impact
The Linux kernel framebuffer driver vt8500lcdfb allocates a screen buffer using dma_alloc_coherent(), but the allocated memory is not freed when an error occurs during initialization. This oversight results in a memory leak that persists at kernel level until the driver is reloaded or the system is rebooted. The flaw does not provide an attacker with direct code execution, privilege escalation, or information disclosure, but it can gradually consume kernel‑level memory resources.
Affected Systems
The issue is confined to the Linux kernel and the vt8500lcdfb framebuffer driver. Specific kernel versions are not enumerated in the provided data; affected systems are those running a kernel build that includes this driver and that have not yet incorporated the upstream patch that adds dma_free_coherent() to the error path.
Risk and Exploitability
No CVSS, EPSS, or KEV information is available, indicating the vulnerability is not currently exploited in the wild. Exploitation requires local or privileged access to trigger the driver’s error path, making the attack vector limited to systems that load the vt8500lcdfb driver and experience a frequent initialization failure. The overall risk is low but the flaw can lead to degraded performance or denial of service through resource exhaustion over time.
OpenCVE Enrichment