VYPR
Unrated severityNVD Advisory· Published Nov 12, 2025· Updated Apr 15, 2026

CVE-2025-40111

CVE-2025-40111

Description

In the Linux kernel, the following vulnerability has been resolved:

drm/vmwgfx: Fix Use-after-free in validation

Nodes stored in the validation duplicates hashtable come from an arena allocator that is cleared at the end of vmw_execbuf_process. All nodes are expected to be cleared in vmw_validation_drop_ht but this node escaped because its resource was destroyed prematurely.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Use-after-free in Linux kernel's drm/vmwgfx driver due to a validation node escaping cleanup, potentially leading to memory corruption.

Root

Cause

The vulnerability resides in the Linux kernel's DRM subsystem for VMware graphics (drm/vmwgfx). During command buffer validation, nodes are stored in a duplicates hashtable and allocated from an arena allocator that is cleared at the end of vmw_execbuf_process. All nodes are expected to be removed via vmw_validation_drop_ht, but a specific node escapes because its associated resource is destroyed prematurely, leaving a dangling pointer in the hashtable [1].

Exploitation

An attacker with local access and the ability to submit crafted command buffers to the vmwgfx driver can trigger this use-after-free. The attack requires the ability to cause a resource to be destroyed while a validation node still references it, bypassing the normal cleanup path. No special privileges beyond the ability to interact with the DRM device are needed [2].

Impact

Successful exploitation results in a use-after-free condition, which can lead to memory corruption, system crash (denial of service), or potentially privilege escalation if the freed memory is reallocated for a different purpose. The vulnerability is classified as a high-severity issue due to the potential for arbitrary code execution in kernel context.

Mitigation

The fix is included in the Linux kernel stable tree via commits [1] and [2]. Users should update to a kernel version containing these patches. No workaround is available; the vulnerability is resolved by ensuring that all validation nodes are properly cleaned up even when resources are destroyed early.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

8

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

8

News mentions

0

No linked articles in our index yet.