CVE-2025-37851
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
09/05/2025
Last modified:
17/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
fbdev: omapfb: Add &#39;plane&#39; value check<br />
<br />
Function dispc_ovl_setup is not intended to work with the value OMAP_DSS_WB<br />
of the enum parameter plane.<br />
<br />
The value of this parameter is initialized in dss_init_overlays and in the<br />
current state of the code it cannot take this value so it&#39;s not a real<br />
problem.<br />
<br />
For the purposes of defensive coding it wouldn&#39;t be superfluous to check<br />
the parameter value, because some functions down the call stack process<br />
this value correctly and some not.<br />
<br />
For example, in dispc_ovl_setup_global_alpha it may lead to buffer<br />
overflow.<br />
<br />
Add check for this value.<br />
<br />
Found by Linux Verification Center (linuxtesting.org) with SVACE static<br />
analysis tool.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 2.6.33 (including) | 5.4.293 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.237 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.181 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.135 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.88 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.24 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.13.12 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.14 (including) | 6.14.3 (excluding) |
| cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/09dbf22fd68c2f1a81ab89670ffa1ec3033436c4
- https://git.kernel.org/stable/c/3e411827f31db7f938a30a3c7a7599839401ec30
- https://git.kernel.org/stable/c/4efd8ef5e40f2c7a4a91a5a9f03140bfa827da89
- https://git.kernel.org/stable/c/52eafaa56f8f6d6a0cdff9282b25b4acbde34edc
- https://git.kernel.org/stable/c/660a53a0694d1f3789802509fe729dd4656fc5e0
- https://git.kernel.org/stable/c/9b0a41589ee70529b20e1e0108d03f10c649bdc4
- https://git.kernel.org/stable/c/a570efb4d877adbf3db2dc95487f2ba6bfdd148a
- https://git.kernel.org/stable/c/cdf41d72e8b015d9ea68f5a1c0a79624e7c312aa
- https://git.kernel.org/stable/c/fda15c5b96b883d62fb2d84a3a1422aa87717897
- https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html
- https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html



