CVE-2025-40323
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-12-08

Last updated on: 2026-04-18

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: fbcon: Set fb_display[i]->mode to NULL when the mode is released Recently, we discovered the following issue through syzkaller: BUG: KASAN: slab-use-after-free in fb_mode_is_equal+0x285/0x2f0 Read of size 4 at addr ff11000001b3c69c by task syz.xxx ... Call Trace: <TASK> dump_stack_lvl+0xab/0xe0 print_address_description.constprop.0+0x2c/0x390 print_report+0xb9/0x280 kasan_report+0xb8/0xf0 fb_mode_is_equal+0x285/0x2f0 fbcon_mode_deleted+0x129/0x180 fb_set_var+0xe7f/0x11d0 do_fb_ioctl+0x6a0/0x750 fb_ioctl+0xe0/0x140 __x64_sys_ioctl+0x193/0x210 do_syscall_64+0x5f/0x9c0 entry_SYSCALL_64_after_hwframe+0x76/0x7e Based on experimentation and analysis, during framebuffer unregistration, only the memory of fb_info->modelist is freed, without setting the corresponding fb_display[i]->mode to NULL for the freed modes. This leads to UAF issues during subsequent accesses. Here's an example of reproduction steps: 1. With /dev/fb0 already registered in the system, load a kernel module to register a new device /dev/fb1; 2. Set fb1's mode to the global fb_display[] array (via FBIOPUT_CON2FBMAP); 3. Switch console from fb to VGA (to allow normal rmmod of the ko); 4. Unload the kernel module, at this point fb1's modelist is freed, leaving a wild pointer in fb_display[]; 5. Trigger the bug via system calls through fb0 attempting to delete a mode from fb0. Add a check in do_unregister_framebuffer(): if the mode to be freed exists in fb_display[], set the corresponding mode pointer to NULL.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-08
Last Modified
2026-04-18
Generated
2026-05-06
AI Q&A
2025-12-08
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
linux linux_kernel *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a use-after-free (UAF) issue in the Linux kernel's framebuffer console (fbcon) subsystem. When a framebuffer device is unregistered, the memory for its mode list is freed, but the corresponding pointers in the global fb_display array are not set to NULL. This leaves wild pointers that can be accessed later, causing a use-after-free error. The issue was discovered through syzkaller and involves accessing freed memory during framebuffer mode operations, which can lead to kernel crashes or undefined behavior.


How can this vulnerability impact me? :

This vulnerability can lead to kernel crashes or instability due to use-after-free memory access in the framebuffer console subsystem. Exploiting this issue could potentially allow an attacker to execute arbitrary code in kernel mode or cause denial of service by crashing the system.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by monitoring kernel logs for KASAN (Kernel Address Sanitizer) reports indicating a slab-use-after-free in fb_mode_is_equal. Specifically, look for messages similar to: 'BUG: KASAN: slab-use-after-free in fb_mode_is_equal'. You can check kernel logs using commands like 'dmesg | grep KASAN' or 'journalctl -k | grep KASAN'. Additionally, reproducing the issue involves loading and unloading framebuffer devices and observing for use-after-free errors in the logs.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include avoiding loading or unloading framebuffer kernel modules that register additional /dev/fb devices until a patched kernel is applied. Also, refrain from switching console modes that trigger the framebuffer unregistration process. Applying the kernel patch that sets fb_display[i]->mode to NULL when the mode is released will resolve the issue. Until then, monitor for related kernel errors and avoid operations that trigger the vulnerability.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart