In the Linux kernel, the following vulnerability has been resolved:
drm/vmwgfx: Validate the box size for the snooped cursor
Invalid userspace dma surface copies could potentially overflow
the memcpy from the surface to the snooped image leading to crashes.
To fix it the dimensions of the copybox have to be validated
against the expected size of the snooped cursor.
References
Configurations
Configuration 1 (hide)
|
History
21 Jan 2026, 21:38
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
| References | () https://git.kernel.org/stable/c/439cbbc1519547f9a7b483f0de33b556ebfec901 - Patch | |
| References | () https://git.kernel.org/stable/c/4cf949c7fafe21e085a4ee386bb2dade9067316e - Patch | |
| References | () https://git.kernel.org/stable/c/4d54d11b49860686331c58a00f733b16a93edfc4 - Patch | |
| References | () https://git.kernel.org/stable/c/50d177f90b63ea4138560e500d92be5e4c928186 - Patch | |
| References | () https://git.kernel.org/stable/c/622d527decaac0eb65512acada935a0fdc1d0202 - Patch | |
| References | () https://git.kernel.org/stable/c/6948e570f54f2044dd4da444b10471373a047eeb - Patch | |
| References | () https://git.kernel.org/stable/c/6b4e70a428b5a11f56db94047b68e144529fe512 - Patch | |
| References | () https://git.kernel.org/stable/c/94b283341f9f3f0ed56a360533766377a01540e0 - Patch | |
| References | () https://git.kernel.org/stable/c/ee8d31836cbe7c26e207bfa0a4a726f0a25cfcf6 - Patch | |
| CWE | CWE-476 | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| First Time |
Linux
Linux linux Kernel |
01 Oct 2025, 12:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-10-01 12:15
Updated : 2026-01-21 21:38
NVD link : CVE-2022-50440
Mitre link : CVE-2022-50440
CVE.ORG link : CVE-2022-50440
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-476
NULL Pointer Dereference
