In the Linux kernel, the following vulnerability has been resolved: drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE This data originates from userspace and is used in buffer offset calculations which could potentially overflow causing an out-of-bounds access.
Upstream advisory: https://lore.kernel.org/linux-cve-announce/2025120717-CVE-2025-40277-d511@gregkh/T
This issue has been addressed in the following products: Red Hat Enterprise Linux 10 Via RHSA-2026:0453 https://access.redhat.com/errata/RHSA-2026:0453
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2026:0793 https://access.redhat.com/errata/RHSA-2026:0793
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.4 Extended Update Support Via RHSA-2026:0917 https://access.redhat.com/errata/RHSA-2026:0917
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2026:1148 https://access.redhat.com/errata/RHSA-2026:1148
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2026:1142 https://access.redhat.com/errata/RHSA-2026:1142
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.6 Extended Update Support Via RHSA-2026:1194 https://access.redhat.com/errata/RHSA-2026:1194
This issue has been addressed in the following products: Red Hat Enterprise Linux 10.0 Extended Update Support Via RHSA-2026:1236 https://access.redhat.com/errata/RHSA-2026:1236