CVE-2025-38630 (GCVE-0-2025-38630)
Vulnerability from cvelistv5
Published
2025-08-22 16:00
Modified
2025-08-28 14:44
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: fbdev: imxfb: Check fb_add_videomode to prevent null-ptr-deref fb_add_videomode() can fail with -ENOMEM when its internal kmalloc() cannot allocate a struct fb_modelist. If that happens, the modelist stays empty but the driver continues to register. Add a check for its return value to prevent poteintial null-ptr-deref, which is similar to the commit 17186f1f90d3 ("fbdev: Fix do_register_framebuffer to prevent null-ptr-deref in fb_videomode_to_var").
Impacted products
Vendor Product Version
Linux Linux Version: 1b6c79361ba5ce30b40f0f7d6fc2421dc5fcbe0c
Version: 1b6c79361ba5ce30b40f0f7d6fc2421dc5fcbe0c
Version: 1b6c79361ba5ce30b40f0f7d6fc2421dc5fcbe0c
Version: 1b6c79361ba5ce30b40f0f7d6fc2421dc5fcbe0c
Version: 1b6c79361ba5ce30b40f0f7d6fc2421dc5fcbe0c
Version: 1b6c79361ba5ce30b40f0f7d6fc2421dc5fcbe0c
Version: 1b6c79361ba5ce30b40f0f7d6fc2421dc5fcbe0c
Version: 1b6c79361ba5ce30b40f0f7d6fc2421dc5fcbe0c
Version: 1b6c79361ba5ce30b40f0f7d6fc2421dc5fcbe0c
Create a notification for this product.
   Linux Linux Version: 3.11
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/video/fbdev/imxfb.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "69373502c2b5d364842c702c941d1171e4f35a7c",
              "status": "affected",
              "version": "1b6c79361ba5ce30b40f0f7d6fc2421dc5fcbe0c",
              "versionType": "git"
            },
            {
              "lessThan": "f00c29e6755ead56baf2a9c1d3c4c0bb40af3612",
              "status": "affected",
              "version": "1b6c79361ba5ce30b40f0f7d6fc2421dc5fcbe0c",
              "versionType": "git"
            },
            {
              "lessThan": "cca8f5a3991916729b39d797d01499c335137319",
              "status": "affected",
              "version": "1b6c79361ba5ce30b40f0f7d6fc2421dc5fcbe0c",
              "versionType": "git"
            },
            {
              "lessThan": "ac16154cccda8be10ee3ae188f10a06f3890bc5d",
              "status": "affected",
              "version": "1b6c79361ba5ce30b40f0f7d6fc2421dc5fcbe0c",
              "versionType": "git"
            },
            {
              "lessThan": "4b5d36cc3014986e6fac12eaa8433fe56801d4ce",
              "status": "affected",
              "version": "1b6c79361ba5ce30b40f0f7d6fc2421dc5fcbe0c",
              "versionType": "git"
            },
            {
              "lessThan": "40f0a51f6c54d46a94b9f1180339ede7ca7ee190",
              "status": "affected",
              "version": "1b6c79361ba5ce30b40f0f7d6fc2421dc5fcbe0c",
              "versionType": "git"
            },
            {
              "lessThan": "49377bac9e3bec1635065a033c9679214fe7593e",
              "status": "affected",
              "version": "1b6c79361ba5ce30b40f0f7d6fc2421dc5fcbe0c",
              "versionType": "git"
            },
            {
              "lessThan": "f060441c153495750804133555cf0a211a856892",
              "status": "affected",
              "version": "1b6c79361ba5ce30b40f0f7d6fc2421dc5fcbe0c",
              "versionType": "git"
            },
            {
              "lessThan": "da11e6a30e0bb8e911288bdc443b3dc8f6a7cac7",
              "status": "affected",
              "version": "1b6c79361ba5ce30b40f0f7d6fc2421dc5fcbe0c",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "drivers/video/fbdev/imxfb.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "3.11"
            },
            {
              "lessThan": "3.11",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.4.*",
              "status": "unaffected",
              "version": "5.4.297",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.10.*",
              "status": "unaffected",
              "version": "5.10.241",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.15.*",
              "status": "unaffected",
              "version": "5.15.190",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.*",
              "status": "unaffected",
              "version": "6.1.148",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.6.*",
              "status": "unaffected",
              "version": "6.6.102",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.12.*",
              "status": "unaffected",
              "version": "6.12.42",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.15.*",
              "status": "unaffected",
              "version": "6.15.10",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.16.*",
              "status": "unaffected",
              "version": "6.16.1",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.17-rc1",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.4.297",
                  "versionStartIncluding": "3.11",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.10.241",
                  "versionStartIncluding": "3.11",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.15.190",
                  "versionStartIncluding": "3.11",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.1.148",
                  "versionStartIncluding": "3.11",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.6.102",
                  "versionStartIncluding": "3.11",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.12.42",
                  "versionStartIncluding": "3.11",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.15.10",
                  "versionStartIncluding": "3.11",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.16.1",
                  "versionStartIncluding": "3.11",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.17-rc1",
                  "versionStartIncluding": "3.11",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nfbdev: imxfb: Check fb_add_videomode to prevent null-ptr-deref\n\nfb_add_videomode() can fail with -ENOMEM when its internal kmalloc() cannot\nallocate a struct fb_modelist.  If that happens, the modelist stays empty but\nthe driver continues to register.  Add a check for its return value to prevent\npoteintial null-ptr-deref, which is similar to the commit 17186f1f90d3 (\"fbdev:\nFix do_register_framebuffer to prevent null-ptr-deref in fb_videomode_to_var\")."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-08-28T14:44:20.914Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/69373502c2b5d364842c702c941d1171e4f35a7c"
        },
        {
          "url": "https://git.kernel.org/stable/c/f00c29e6755ead56baf2a9c1d3c4c0bb40af3612"
        },
        {
          "url": "https://git.kernel.org/stable/c/cca8f5a3991916729b39d797d01499c335137319"
        },
        {
          "url": "https://git.kernel.org/stable/c/ac16154cccda8be10ee3ae188f10a06f3890bc5d"
        },
        {
          "url": "https://git.kernel.org/stable/c/4b5d36cc3014986e6fac12eaa8433fe56801d4ce"
        },
        {
          "url": "https://git.kernel.org/stable/c/40f0a51f6c54d46a94b9f1180339ede7ca7ee190"
        },
        {
          "url": "https://git.kernel.org/stable/c/49377bac9e3bec1635065a033c9679214fe7593e"
        },
        {
          "url": "https://git.kernel.org/stable/c/f060441c153495750804133555cf0a211a856892"
        },
        {
          "url": "https://git.kernel.org/stable/c/da11e6a30e0bb8e911288bdc443b3dc8f6a7cac7"
        }
      ],
      "title": "fbdev: imxfb: Check fb_add_videomode to prevent null-ptr-deref",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2025-38630",
    "datePublished": "2025-08-22T16:00:38.678Z",
    "dateReserved": "2025-04-16T04:51:24.029Z",
    "dateUpdated": "2025-08-28T14:44:20.914Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2025-38630\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-08-22T16:15:36.750\",\"lastModified\":\"2025-08-28T15:15:56.580\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nfbdev: imxfb: Check fb_add_videomode to prevent null-ptr-deref\\n\\nfb_add_videomode() can fail with -ENOMEM when its internal kmalloc() cannot\\nallocate a struct fb_modelist.  If that happens, the modelist stays empty but\\nthe driver continues to register.  Add a check for its return value to prevent\\npoteintial null-ptr-deref, which is similar to the commit 17186f1f90d3 (\\\"fbdev:\\nFix do_register_framebuffer to prevent null-ptr-deref in fb_videomode_to_var\\\").\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: fbdev: imxfb: Comprobar fb_add_videomode para evitar la desreferencia de PTR nula. fb_add_videomode() puede fallar con -ENOMEM cuando su funci\u00f3n interna kmalloc() no puede asignar una estructura fb_modelist. En tal caso, la estructura de modelist permanece vac\u00eda, pero el controlador contin\u00faa registr\u00e1ndose. Se ha a\u00f1adido una comprobaci\u00f3n de su valor de retorno para evitar una posible desreferencia de PTR nula, similar al commit 17186f1f90d3 (\\\"fbdev: Corregir do_register_framebuffer para evitar la desreferencia de PTR nula en fb_videomode_to_var\\\").\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/40f0a51f6c54d46a94b9f1180339ede7ca7ee190\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/49377bac9e3bec1635065a033c9679214fe7593e\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/4b5d36cc3014986e6fac12eaa8433fe56801d4ce\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/69373502c2b5d364842c702c941d1171e4f35a7c\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/ac16154cccda8be10ee3ae188f10a06f3890bc5d\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/cca8f5a3991916729b39d797d01499c335137319\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/da11e6a30e0bb8e911288bdc443b3dc8f6a7cac7\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/f00c29e6755ead56baf2a9c1d3c4c0bb40af3612\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/f060441c153495750804133555cf0a211a856892\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…