CVE-2025-40360
Description
In the Linux kernel, the following vulnerability has been resolved:
drm/sysfb: Do not dereference NULL pointer in plane reset
The plane state in __drm_gem_reset_shadow_plane() can be NULL. Do not deref that pointer, but forward NULL to the other plane-reset helpers. Clears plane->state to NULL.
v2: - fix typo in commit description (Javier)
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A null-pointer dereference in the Linux kernel's drm/sysfb plane reset was fixed by adding a NULL check.
Vulnerability
Description
A null-pointer dereference vulnerability exists in the Linux kernel's drm/sysfb subsystem, specifically in the __drm_gem_reset_shadow_plane() function. The function does not check if the plane state pointer is NULL before dereferencing it, leading to a potential crash when a system with certain graphics configurations attempts to reset the plane [1].
Exploitation
An attacker would need to be able to trigger a plane reset operation on a system using the affected kernel versions. This could be achieved by a user with local access or by unprivileged code that causes the DRM subsystem to perform a plane reset, such as during display mode changes or certain graphics operations. No authentication is required beyond the ability to interact with the DRM subsystem [2].
Impact
Successful exploitation could lead to a denial of service (system crash) or potentially other undefined behavior due to the null-pointer dereference. The issue is considered moderate severity as it requires local access or specific conditions to trigger, but it could result in system instability [3].
Mitigation
The fix, which checks for NULL before dereferencing the plane state pointer and properly forwards NULL to other helpers, has been applied to the Linux kernel stable tree [1]. Systems should apply the available kernel updates to remediate this vulnerability.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2Patches
66abeff03cb79c4faf7f417eeb61ed8005bd36bdef5648a60c7d5e69866bb14e02ed3876fVulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
6- git.kernel.org/stable/c/14e02ed3876f4ab0ed6d3f41972175f8b8df3d70nvd
- git.kernel.org/stable/c/6abeff03cb79a2c7f4554a8e8738acd35bb37152nvd
- git.kernel.org/stable/c/6bdef5648a60e49d4a3b02461ab7ae3776877e77nvd
- git.kernel.org/stable/c/b61ed8005bd3102510fab5015ac6a275c9c5ea16nvd
- git.kernel.org/stable/c/c4faf7f417eea8b8d5cc570a1015736f307aa2d5nvd
- git.kernel.org/stable/c/c7d5e69866bbe95c1e4ab4c10a81e0a02d9ea232nvd
News mentions
0No linked articles in our index yet.