CVE-2025-38585
BaseFortify
Publication date: 2025-08-19
Last updated on: 2025-11-26
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-787 | The product writes data past the end, or before the beginning, of the intended buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a stack buffer overflow in the Linux kernel's atomisp media driver, specifically in the gmin_get_var_int() function. It occurs when the function calls efi.get_variable() to retrieve an EFI variable larger than the expected buffer size (64 bytes). Due to improper error handling, gmin_get_config_var() does not correctly detect when the buffer is too small and mistakenly believes the call succeeded. As a result, gmin_get_var_int() writes a null terminator beyond the allocated 65-byte stack buffer, causing a stack buffer overflow. This happens during device initialization for camera sensor configuration on certain Intel platforms.
How can this vulnerability impact me? :
This vulnerability can lead to a stack buffer overflow, which may be exploited to execute arbitrary code. Since EFI variables can be controlled by firmware or system configuration, an attacker with the ability to influence these variables could potentially exploit this flaw to compromise the system, leading to unauthorized code execution or system instability.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the Linux kernel to a version where the stack buffer overflow in gmin_get_var_int() has been fixed. The fix involves proper error handling in gmin_get_config_var() to prevent buffer overflow when EFI variables exceed 64 bytes. Until the update is applied, avoid using affected Intel Bay Trail and Cherry Trail platforms with the atomisp camera stack or disable the atomisp camera driver if possible.