-

CVE-2025-39967

In the Linux kernel, the following vulnerability has been resolved:

fbcon: fix integer overflow in fbcon_do_set_font

Fix integer overflow vulnerabilities in fbcon_do_set_font() where font
size calculations could overflow when handling user-controlled font
parameters.

The vulnerabilities occur when:
1. CALC_FONTSZ(h, pitch, charcount) performs h * pith * charcount
   multiplication with user-controlled values that can overflow.
2. FONT_EXTRA_WORDS * sizeof(int) + size addition can also overflow
3. This results in smaller allocations than expected, leading to buffer
   overflows during font data copying.

Add explicit overflow checking using check_mul_overflow() and
check_add_overflow() kernel helpers to safety validate all size
calculations before allocation.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < 994bdc2d23c79087fbf7dcd9544454e8ebcef877
Version 96e41fc29e8af5c5085fb8a79cab8d0d00bab86c
Status affected
Version < 9c8ec14075c5317edd6b242f1be8167aa1e4e333
Version 39b3cffb8cf3111738ea993e2757ab382253d86a
Status affected
Version < b8a6e85328aeb9881531dbe89bcd2637a06c3c95
Version 39b3cffb8cf3111738ea993e2757ab382253d86a
Status affected
Version < a6eb9f423b3db000aaedf83367b8539f6b72dcfc
Version 39b3cffb8cf3111738ea993e2757ab382253d86a
Status affected
Version < adac90bb1aaf45ca66f9db8ac100be16750ace78
Version 39b3cffb8cf3111738ea993e2757ab382253d86a
Status affected
Version < 4a4bac869560f943edbe3c2b032062f6673b13d3
Version 39b3cffb8cf3111738ea993e2757ab382253d86a
Status affected
Version < c0c01f9aa08c8e10e10e8c9ebb5be01a4eff6eb7
Version 39b3cffb8cf3111738ea993e2757ab382253d86a
Status affected
Version < 1a194e6c8e1ee745e914b0b7f50fa86c89ed13fe
Version 39b3cffb8cf3111738ea993e2757ab382253d86a
Status affected
Version ae021a904ac82d9fc81c25329d3c465c5a7d5686
Status affected
Version 451bffa366f2cc0e5314807cb847f31c0226efed
Status affected
Version 2c455e9c5865861f5ce09c5f596909495ed7657c
Status affected
Version 72f099805dbc907fbe8fa19bccdc31d3e2ee6e9e
Status affected
Version 34cf1aff169dc6dedad8d79da7bf1b4de2773dbc
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 5.9
Status affected
Version < 5.9
Version 0
Status unaffected
Version <= 5.4.*
Version 5.4.300
Status unaffected
Version <= 5.10.*
Version 5.10.245
Status unaffected
Version <= 5.15.*
Version 5.15.194
Status unaffected
Version <= 6.1.*
Version 6.1.155
Status unaffected
Version <= 6.6.*
Version 6.6.109
Status unaffected
Version <= 6.12.*
Version 6.12.50
Status unaffected
Version <= 6.16.*
Version 6.16.10
Status unaffected
Version <= *
Version 6.17
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.06% 0.195
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String