CVE-2025-38215
BaseFortify
Publication date: 2025-07-04
Last updated on: 2025-12-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 2.6.13 (inc) to 6.1.143 (exc) |
| linux | linux_kernel | From 6.2 (inc) to 6.6.95 (exc) |
| linux | linux_kernel | From 6.7 (inc) to 6.12.35 (exc) |
| linux | linux_kernel | From 6.13 (inc) to 6.15.4 (exc) |
| linux | linux_kernel | 2.6.12 |
| linux | linux_kernel | 2.6.12 |
| linux | linux_kernel | 2.6.12 |
| linux | linux_kernel | 2.6.12 |
| linux | linux_kernel | 2.6.12 |
| debian | debian_linux | 11.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-476 | The product dereferences a pointer that it expects to be valid but is NULL. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's framebuffer device (fbdev) subsystem occurs when the function fb_add_videomode() fails to allocate memory during framebuffer registration (do_register_framebuffer). This failure leads to a null pointer dereference in fb_videomode_to_var() because fb_info is registered without the expected video mode in its mode list. As a result, the system may experience a kernel panic or crash due to accessing invalid memory.
How can this vulnerability impact me? :
The impact of this vulnerability is a potential system crash or kernel panic caused by a null pointer dereference in the framebuffer subsystem. This can lead to denial of service by making the system unstable or unresponsive, especially on systems relying on framebuffer devices for display output.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the Linux kernel to a version where the fix for the null pointer dereference in fb_videomode_to_var is applied. This fix prevents registering fb_info if its mode was not set successfully, avoiding the null pointer dereference. Avoid using vulnerable kernel versions and apply patches provided by the Linux kernel maintainers as soon as possible.