-
CVE-2025-39967
- EPSS 0.06%
- Veröffentlicht 15.10.2025 07:55:51
- Zuletzt bearbeitet 16.10.2025 15:29:11
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
In the Linux kernel, the following vulnerability has been resolved: fbcon: fix integer overflow in fbcon_do_set_font Fix integer overflow vulnerabilities in fbcon_do_set_font() where font size calculations could overflow when handling user-controlled font parameters. The vulnerabilities occur when: 1. CALC_FONTSZ(h, pitch, charcount) performs h * pith * charcount multiplication with user-controlled values that can overflow. 2. FONT_EXTRA_WORDS * sizeof(int) + size addition can also overflow 3. This results in smaller allocations than expected, leading to buffer overflows during font data copying. Add explicit overflow checking using check_mul_overflow() and check_add_overflow() kernel helpers to safety validate all size calculations before allocation.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
994bdc2d23c79087fbf7dcd9544454e8ebcef877
Version
96e41fc29e8af5c5085fb8a79cab8d0d00bab86c
Status
affected
Version <
9c8ec14075c5317edd6b242f1be8167aa1e4e333
Version
39b3cffb8cf3111738ea993e2757ab382253d86a
Status
affected
Version <
b8a6e85328aeb9881531dbe89bcd2637a06c3c95
Version
39b3cffb8cf3111738ea993e2757ab382253d86a
Status
affected
Version <
a6eb9f423b3db000aaedf83367b8539f6b72dcfc
Version
39b3cffb8cf3111738ea993e2757ab382253d86a
Status
affected
Version <
adac90bb1aaf45ca66f9db8ac100be16750ace78
Version
39b3cffb8cf3111738ea993e2757ab382253d86a
Status
affected
Version <
4a4bac869560f943edbe3c2b032062f6673b13d3
Version
39b3cffb8cf3111738ea993e2757ab382253d86a
Status
affected
Version <
c0c01f9aa08c8e10e10e8c9ebb5be01a4eff6eb7
Version
39b3cffb8cf3111738ea993e2757ab382253d86a
Status
affected
Version <
1a194e6c8e1ee745e914b0b7f50fa86c89ed13fe
Version
39b3cffb8cf3111738ea993e2757ab382253d86a
Status
affected
Version
ae021a904ac82d9fc81c25329d3c465c5a7d5686
Status
affected
Version
451bffa366f2cc0e5314807cb847f31c0226efed
Status
affected
Version
2c455e9c5865861f5ce09c5f596909495ed7657c
Status
affected
Version
72f099805dbc907fbe8fa19bccdc31d3e2ee6e9e
Status
affected
Version
34cf1aff169dc6dedad8d79da7bf1b4de2773dbc
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
5.9
Status
affected
Version <
5.9
Version
0
Status
unaffected
Version <=
5.4.*
Version
5.4.300
Status
unaffected
Version <=
5.10.*
Version
5.10.245
Status
unaffected
Version <=
5.15.*
Version
5.15.194
Status
unaffected
Version <=
6.1.*
Version
6.1.155
Status
unaffected
Version <=
6.6.*
Version
6.6.109
Status
unaffected
Version <=
6.12.*
Version
6.12.50
Status
unaffected
Version <=
6.16.*
Version
6.16.10
Status
unaffected
Version <=
*
Version
6.17
Status
unaffected
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.06% | 0.195 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|