CVE-2025-38685
Severity CVSS v4.0:
Pending analysis
Type:
CWE-787
Out-of-bounds Write
Publication date:
04/09/2025
Last modified:
08/01/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
fbdev: Fix vmalloc out-of-bounds write in fast_imageblit<br />
<br />
This issue triggers when a userspace program does an ioctl<br />
FBIOPUT_CON2FBMAP by passing console number and frame buffer number.<br />
Ideally this maps console to frame buffer and updates the screen if<br />
console is visible.<br />
<br />
As part of mapping it has to do resize of console according to frame<br />
buffer info. if this resize fails and returns from vc_do_resize() and<br />
continues further. At this point console and new frame buffer are mapped<br />
and sets display vars. Despite failure still it continue to proceed<br />
updating the screen at later stages where vc_data is related to previous<br />
frame buffer and frame buffer info and display vars are mapped to new<br />
frame buffer and eventully leading to out-of-bounds write in<br />
fast_imageblit(). This bheviour is excepted only when fg_console is<br />
equal to requested console which is a visible console and updates screen<br />
with invalid struct references in fbcon_putcs().
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 2.6.13 (including) | 5.15.190 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.149 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.103 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.43 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.15.11 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.16 (including) | 6.16.2 (excluding) |
| cpe:2.3:o:linux:linux_kernel:2.6.12:-:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.12:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.12:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/078e62bffca4b7e72e8f3550eb063ab981c36c7a
- https://git.kernel.org/stable/c/27b118aebdd84161c8ff5ce49d9d536f2af10754
- https://git.kernel.org/stable/c/4c4d7ddaf1d43780b106bedc692679f965dc5a3a
- https://git.kernel.org/stable/c/56701bf9eeb63219e378cb7fcbd066ea4eaeeb50
- https://git.kernel.org/stable/c/af0db3c1f898144846d4c172531a199bb3ca375d
- https://git.kernel.org/stable/c/cfec17721265e72e50cc69c6004fe3475cd38df2
- https://git.kernel.org/stable/c/ed9b8e5016230868c8d813d9179523f729fec8c6
- https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html



