CVE-2025-38685

In the Linux kernel, the following vulnerability has been resolved: fbdev: Fix vmalloc out-of-bounds write in fast_imageblit This issue triggers when a userspace program does an ioctl FBIOPUT_CON2FBMAP by passing console number and frame buffer number. Ideally this maps console to frame buffer and updates the screen if console is visible. As part of mapping it has to do resize of console according to frame buffer info. if this resize fails and returns from vc_do_resize() and continues further. At this point console and new frame buffer are mapped and sets display vars. Despite failure still it continue to proceed updating the screen at later stages where vc_data is related to previous frame buffer and frame buffer info and display vars are mapped to new frame buffer and eventully leading to out-of-bounds write in fast_imageblit(). This bheviour is excepted only when fg_console is equal to requested console which is a visible console and updates screen with invalid struct references in fbcon_putcs().
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

08 Jan 2026, 22:31

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CPE cpe:2.3:o:linux:linux_kernel:2.6.12:rc2:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:*
First Time Linux
Debian
Debian debian Linux
Linux linux Kernel
References () https://git.kernel.org/stable/c/078e62bffca4b7e72e8f3550eb063ab981c36c7a - () https://git.kernel.org/stable/c/078e62bffca4b7e72e8f3550eb063ab981c36c7a - Patch
References () https://git.kernel.org/stable/c/27b118aebdd84161c8ff5ce49d9d536f2af10754 - () https://git.kernel.org/stable/c/27b118aebdd84161c8ff5ce49d9d536f2af10754 - Patch
References () https://git.kernel.org/stable/c/4c4d7ddaf1d43780b106bedc692679f965dc5a3a - () https://git.kernel.org/stable/c/4c4d7ddaf1d43780b106bedc692679f965dc5a3a - Patch
References () https://git.kernel.org/stable/c/56701bf9eeb63219e378cb7fcbd066ea4eaeeb50 - () https://git.kernel.org/stable/c/56701bf9eeb63219e378cb7fcbd066ea4eaeeb50 - Patch
References () https://git.kernel.org/stable/c/af0db3c1f898144846d4c172531a199bb3ca375d - () https://git.kernel.org/stable/c/af0db3c1f898144846d4c172531a199bb3ca375d - Patch
References () https://git.kernel.org/stable/c/cfec17721265e72e50cc69c6004fe3475cd38df2 - () https://git.kernel.org/stable/c/cfec17721265e72e50cc69c6004fe3475cd38df2 - Patch
References () https://git.kernel.org/stable/c/ed9b8e5016230868c8d813d9179523f729fec8c6 - () https://git.kernel.org/stable/c/ed9b8e5016230868c8d813d9179523f729fec8c6 - Patch
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory
CWE CWE-787

03 Nov 2025, 18:16

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html -

04 Sep 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-09-04 16:15

Updated : 2026-01-08 22:31


NVD link : CVE-2025-38685

Mitre link : CVE-2025-38685

CVE.ORG link : CVE-2025-38685


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel
CWE
CWE-787

Out-of-bounds Write