Home

Description

In the Linux kernel, the following vulnerability has been resolved: fbdev: fix potential buffer overflow in do_register_framebuffer() The current implementation may lead to buffer overflow when: 1. Unregistration creates NULL gaps in registered_fb[] 2. All array slots become occupied despite num_registered_fb < FB_MAX 3. The registration loop exceeds array bounds Add boundary check to prevent registered_fb[FB_MAX] access.

PUBLISHED Reserved 2025-04-16 | Published 2025-09-04 | Updated 2025-09-29 | Assigner Linux

Product status

Default status
unaffected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 5c3f5a25c62230b7965804ce7a2e9305c3ca3961
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before cbe740de32bb0fb7a5213731ff5f26ea6718fca3
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 806f85bdd3a60187c21437fc51baace11f659f35
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 2828a433c7d7a05b6f27c8148502095101dd0b09
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 248b2aab9b2af5ecf89d9d7955a2ff20c4b4a399
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 523b84dc7ccea9c4d79126d6ed1cf9033cf83b05
affected

Default status
affected

6.1.149 (semver)
unaffected

6.6.103 (semver)
unaffected

6.12.43 (semver)
unaffected

6.15.11 (semver)
unaffected

6.16.2 (semver)
unaffected

6.17 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/5c3f5a25c62230b7965804ce7a2e9305c3ca3961

git.kernel.org/...c/cbe740de32bb0fb7a5213731ff5f26ea6718fca3

git.kernel.org/...c/806f85bdd3a60187c21437fc51baace11f659f35

git.kernel.org/...c/2828a433c7d7a05b6f27c8148502095101dd0b09

git.kernel.org/...c/248b2aab9b2af5ecf89d9d7955a2ff20c4b4a399

git.kernel.org/...c/523b84dc7ccea9c4d79126d6ed1cf9033cf83b05

cve.org (CVE-2025-38702)

nvd.nist.gov (CVE-2025-38702)

Download JSON