CVE-2025-68296
BaseFortify
Publication date: 2025-12-16
Last updated on: 2025-12-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a race condition in the Linux kernel's framebuffer console (fbcon) setup related to VGA switcheroo. The issue occurs because vga_switcheroo_client_fb_set() is called before the framebuffer is registered, causing the fbcon to use an invalid node value (-1). This leads to out-of-bounds access in fbcon_remap_all() when switching VGA outputs. The fix involves moving the call to vga_switcheroo_client_fb_set() to after the framebuffer registration and protecting it with the console lock to avoid the race condition.
How can this vulnerability impact me? :
This vulnerability can cause out-of-bounds memory access during VGA output switching, potentially leading to system instability or crashes. It affects systems using certain graphics drivers (amdgpu, i915, nouveau, radeon) that support VGA switcheroo. The race condition could result in improper framebuffer switching, which may disrupt display output or cause kernel errors.
What immediate steps should I take to mitigate this vulnerability?
Apply the patch or update that moves the vga_switcheroo_client_fb_set() call under fbcon_fb_registered(), ensuring it holds the console lock to avoid the race condition. This fix serializes the helper with VGA switcheroo's call to fbcon_remap_all(), preventing out-of-bounds access and improper framebuffer switching. If you use amdgpu, i915, nouveau, or radeon drivers, ensure your Linux kernel is updated with this fix.