Home

Description

In the Linux kernel, the following vulnerability has been resolved: fbcon: fix integer overflow in fbcon_do_set_font Fix integer overflow vulnerabilities in fbcon_do_set_font() where font size calculations could overflow when handling user-controlled font parameters. The vulnerabilities occur when: 1. CALC_FONTSZ(h, pitch, charcount) performs h * pith * charcount multiplication with user-controlled values that can overflow. 2. FONT_EXTRA_WORDS * sizeof(int) + size addition can also overflow 3. This results in smaller allocations than expected, leading to buffer overflows during font data copying. Add explicit overflow checking using check_mul_overflow() and check_add_overflow() kernel helpers to safety validate all size calculations before allocation.

PUBLISHED Reserved 2025-04-16 | Published 2025-10-15 | Updated 2025-10-15 | Assigner Linux

Product status

Default status
unaffected

96e41fc29e8af5c5085fb8a79cab8d0d00bab86c before 994bdc2d23c79087fbf7dcd9544454e8ebcef877
affected

39b3cffb8cf3111738ea993e2757ab382253d86a before 9c8ec14075c5317edd6b242f1be8167aa1e4e333
affected

39b3cffb8cf3111738ea993e2757ab382253d86a before b8a6e85328aeb9881531dbe89bcd2637a06c3c95
affected

39b3cffb8cf3111738ea993e2757ab382253d86a before a6eb9f423b3db000aaedf83367b8539f6b72dcfc
affected

39b3cffb8cf3111738ea993e2757ab382253d86a before adac90bb1aaf45ca66f9db8ac100be16750ace78
affected

39b3cffb8cf3111738ea993e2757ab382253d86a before 4a4bac869560f943edbe3c2b032062f6673b13d3
affected

39b3cffb8cf3111738ea993e2757ab382253d86a before c0c01f9aa08c8e10e10e8c9ebb5be01a4eff6eb7
affected

39b3cffb8cf3111738ea993e2757ab382253d86a before 1a194e6c8e1ee745e914b0b7f50fa86c89ed13fe
affected

ae021a904ac82d9fc81c25329d3c465c5a7d5686
affected

451bffa366f2cc0e5314807cb847f31c0226efed
affected

2c455e9c5865861f5ce09c5f596909495ed7657c
affected

72f099805dbc907fbe8fa19bccdc31d3e2ee6e9e
affected

34cf1aff169dc6dedad8d79da7bf1b4de2773dbc
affected

Default status
affected

5.9
affected

Any version before 5.9
unaffected

5.4.300
unaffected

5.10.245
unaffected

5.15.194
unaffected

6.1.155
unaffected

6.6.109
unaffected

6.12.50
unaffected

6.16.10
unaffected

6.17
unaffected

References

git.kernel.org/...c/994bdc2d23c79087fbf7dcd9544454e8ebcef877

git.kernel.org/...c/9c8ec14075c5317edd6b242f1be8167aa1e4e333

git.kernel.org/...c/b8a6e85328aeb9881531dbe89bcd2637a06c3c95

git.kernel.org/...c/a6eb9f423b3db000aaedf83367b8539f6b72dcfc

git.kernel.org/...c/adac90bb1aaf45ca66f9db8ac100be16750ace78

git.kernel.org/...c/4a4bac869560f943edbe3c2b032062f6673b13d3

git.kernel.org/...c/c0c01f9aa08c8e10e10e8c9ebb5be01a4eff6eb7

git.kernel.org/...c/1a194e6c8e1ee745e914b0b7f50fa86c89ed13fe

cve.org (CVE-2025-39967)

nvd.nist.gov (CVE-2025-39967)

Download JSON