๐Ÿ” CVE Alert

CVE-2025-40110

UNKNOWN 0.0

drm/vmwgfx: Fix a null-ptr access in the cursor snooper

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: drm/vmwgfx: Fix a null-ptr access in the cursor snooper Check that the resource which is converted to a surface exists before trying to use the cursor snooper on it. vmw_cmd_res_check allows explicit invalid (SVGA3D_INVALID_ID) identifiers because some svga commands accept SVGA3D_INVALID_ID to mean "no surface", unfortunately functions that accept the actual surfaces as objects might (and in case of the cursor snooper, do not) be able to handle null objects. Make sure that we validate not only the identifier (via the vmw_cmd_res_check) but also check that the actual resource exists before trying to do something with it. Fixes unchecked null-ptr reference in the snooping code.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Nov 12, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
c0951b797e7d0f2c6b0df2c0e18185c72d0cf1a1 < 3332212e93d0f6e24f8fe79f975e077c4e68ca39 c0951b797e7d0f2c6b0df2c0e18185c72d0cf1a1 < 86aae7053d2da3fdfde7b2e84d86e4af50490505 c0951b797e7d0f2c6b0df2c0e18185c72d0cf1a1 < af9d88cbf0fce52f465978360542ef679713491f c0951b797e7d0f2c6b0df2c0e18185c72d0cf1a1 < 299cfb5a7deabdf9ecd30071755672af0aced5eb c0951b797e7d0f2c6b0df2c0e18185c72d0cf1a1 < 13c9e4ed125e19484234c960efe5ac9c55119523 c0951b797e7d0f2c6b0df2c0e18185c72d0cf1a1 < b6fca0a07989f361ceda27cb2d09c555d4d4a964 c0951b797e7d0f2c6b0df2c0e18185c72d0cf1a1 < 5ac2c0279053a2c5265d46903432fb26ae2d0da2
Linux / Linux
3.8

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/3332212e93d0f6e24f8fe79f975e077c4e68ca39 git.kernel.org: https://git.kernel.org/stable/c/86aae7053d2da3fdfde7b2e84d86e4af50490505 git.kernel.org: https://git.kernel.org/stable/c/af9d88cbf0fce52f465978360542ef679713491f git.kernel.org: https://git.kernel.org/stable/c/299cfb5a7deabdf9ecd30071755672af0aced5eb git.kernel.org: https://git.kernel.org/stable/c/13c9e4ed125e19484234c960efe5ac9c55119523 git.kernel.org: https://git.kernel.org/stable/c/b6fca0a07989f361ceda27cb2d09c555d4d4a964 git.kernel.org: https://git.kernel.org/stable/c/5ac2c0279053a2c5265d46903432fb26ae2d0da2