๐Ÿ” CVE Alert

CVE-2025-39967

UNKNOWN 0.0

fbcon: fix integer overflow in fbcon_do_set_font

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: fbcon: fix integer overflow in fbcon_do_set_font Fix integer overflow vulnerabilities in fbcon_do_set_font() where font size calculations could overflow when handling user-controlled font parameters. The vulnerabilities occur when: 1. CALC_FONTSZ(h, pitch, charcount) performs h * pith * charcount multiplication with user-controlled values that can overflow. 2. FONT_EXTRA_WORDS * sizeof(int) + size addition can also overflow 3. This results in smaller allocations than expected, leading to buffer overflows during font data copying. Add explicit overflow checking using check_mul_overflow() and check_add_overflow() kernel helpers to safety validate all size calculations before allocation.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Oct 15, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
96e41fc29e8af5c5085fb8a79cab8d0d00bab86c < 994bdc2d23c79087fbf7dcd9544454e8ebcef877 39b3cffb8cf3111738ea993e2757ab382253d86a < 9c8ec14075c5317edd6b242f1be8167aa1e4e333 39b3cffb8cf3111738ea993e2757ab382253d86a < b8a6e85328aeb9881531dbe89bcd2637a06c3c95 39b3cffb8cf3111738ea993e2757ab382253d86a < a6eb9f423b3db000aaedf83367b8539f6b72dcfc 39b3cffb8cf3111738ea993e2757ab382253d86a < adac90bb1aaf45ca66f9db8ac100be16750ace78 39b3cffb8cf3111738ea993e2757ab382253d86a < 4a4bac869560f943edbe3c2b032062f6673b13d3 39b3cffb8cf3111738ea993e2757ab382253d86a < c0c01f9aa08c8e10e10e8c9ebb5be01a4eff6eb7 39b3cffb8cf3111738ea993e2757ab382253d86a < 1a194e6c8e1ee745e914b0b7f50fa86c89ed13fe ae021a904ac82d9fc81c25329d3c465c5a7d5686 451bffa366f2cc0e5314807cb847f31c0226efed 2c455e9c5865861f5ce09c5f596909495ed7657c 72f099805dbc907fbe8fa19bccdc31d3e2ee6e9e 34cf1aff169dc6dedad8d79da7bf1b4de2773dbc
Linux / Linux
5.9

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/994bdc2d23c79087fbf7dcd9544454e8ebcef877 git.kernel.org: https://git.kernel.org/stable/c/9c8ec14075c5317edd6b242f1be8167aa1e4e333 git.kernel.org: https://git.kernel.org/stable/c/b8a6e85328aeb9881531dbe89bcd2637a06c3c95 git.kernel.org: https://git.kernel.org/stable/c/a6eb9f423b3db000aaedf83367b8539f6b72dcfc git.kernel.org: https://git.kernel.org/stable/c/adac90bb1aaf45ca66f9db8ac100be16750ace78 git.kernel.org: https://git.kernel.org/stable/c/4a4bac869560f943edbe3c2b032062f6673b13d3 git.kernel.org: https://git.kernel.org/stable/c/c0c01f9aa08c8e10e10e8c9ebb5be01a4eff6eb7 git.kernel.org: https://git.kernel.org/stable/c/1a194e6c8e1ee745e914b0b7f50fa86c89ed13fe