CVE-2025-38226
BaseFortify
Publication date: 2025-07-04
Last updated on: 2025-12-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 4.9.337 (inc) to 4.10 (exc) |
| linux | linux_kernel | From 4.14.303 (inc) to 4.15 (exc) |
| linux | linux_kernel | From 4.19.270 (inc) to 4.20 (exc) |
| linux | linux_kernel | From 5.4.229 (inc) to 5.4.296 (exc) |
| linux | linux_kernel | From 5.10.163 (inc) to 5.10.239 (exc) |
| linux | linux_kernel | From 5.15.86 (inc) to 5.15.186 (exc) |
| linux | linux_kernel | From 6.0.16 (inc) to 6.1 (exc) |
| linux | linux_kernel | From 6.1.2 (inc) to 6.1.142 (exc) |
| linux | linux_kernel | From 6.2 (inc) to 6.6.95 (exc) |
| linux | linux_kernel | From 6.7 (inc) to 6.12.35 (exc) |
| linux | linux_kernel | From 6.13 (inc) to 6.15.4 (exc) |
| debian | debian_linux | 11.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-787 | The product writes data past the end, or before the beginning, of the intended buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a memory out-of-bounds write in the Linux kernel's vivid media driver, specifically in the tpg_fill_plane_pattern and tpg_fill_plane_buffer functions. It occurs because the size of the composition can be larger than the allowed format capture rectangle, leading to a write beyond allocated memory. This was detected by the kernel's Address Sanitizer (KASAN) and is fixed by ensuring the composition size does not exceed the format capture rectangle size.
How can this vulnerability impact me? :
This vulnerability can lead to memory corruption in the kernel, which may cause system instability, crashes, or potentially allow an attacker to execute arbitrary code with kernel privileges, compromising system security.