CVE-2025-40110
Description
In the Linux kernel, the following vulnerability has been resolved:
drm/vmwgfx: Fix a null-ptr access in the cursor snooper
Check that the resource which is converted to a surface exists before trying to use the cursor snooper on it.
vmw_cmd_res_check allows explicit invalid (SVGA3D_INVALID_ID) identifiers because some svga commands accept SVGA3D_INVALID_ID to mean "no surface", unfortunately functions that accept the actual surfaces as objects might (and in case of the cursor snooper, do not) be able to handle null objects. Make sure that we validate not only the identifier (via the vmw_cmd_res_check) but also check that the actual resource exists before trying to do something with it.
Fixes unchecked null-ptr reference in the snooping code.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A null-pointer dereference in the VMwgfx DRM driver's cursor snooper can be triggered by a malformed command, leading to a kernel crash.
Vulnerability
In the Linux kernel's VMwgfx DRM driver, the cursor snooper functionality performs an unchecked null-pointer dereference when processing a command that references an invalid surface resource. The function vmw_cmd_res_check accepts the identifier SVGA3D_INVALID_ID to represent "no surface" per the SVGA protocol [1]. However, the cursor snooping code does not handle a null resource object resulting from such an identifier, leading to a null-ptr access [2].
Exploitation
An attacker with access to the VMwgfx device interface (e.g., a local user with permissions to submit command buffers to the virtual GPU) can craft a command that includes an invalid surface handle. By passing an invalid resource identifier to the cursor snooper without additional validation, the kernel attempts to dereference a null pointer [3]. No authentication beyond local system access to the graphics device is required.
Impact
Successful exploitation causes a kernel oops or panic, resulting in a denial of service (DoS). The vulnerability does not appear to allow code execution beyond the immediate null-ptr dereference crash [4].
Mitigation
The fix adds a check to verify that the resource object exists after vmw_cmd_res_check before proceeding with cursor snooping [3][4]. Patches have been committed to the Linux kernel stable tree. Affected systems should update to a kernel version containing the commit that adds the null-resource check.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2Patches
73332212e93d086aae7053d2daf9d88cbf0fc299cfb5a7dea13c9e4ed125eb6fca0a079895ac2c0279053Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
7- git.kernel.org/stable/c/13c9e4ed125e19484234c960efe5ac9c55119523nvd
- git.kernel.org/stable/c/299cfb5a7deabdf9ecd30071755672af0aced5ebnvd
- git.kernel.org/stable/c/3332212e93d0f6e24f8fe79f975e077c4e68ca39nvd
- git.kernel.org/stable/c/5ac2c0279053a2c5265d46903432fb26ae2d0da2nvd
- git.kernel.org/stable/c/86aae7053d2da3fdfde7b2e84d86e4af50490505nvd
- git.kernel.org/stable/c/af9d88cbf0fce52f465978360542ef679713491fnvd
- git.kernel.org/stable/c/b6fca0a07989f361ceda27cb2d09c555d4d4a964nvd
News mentions
0No linked articles in our index yet.