U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2025-40304 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: fbdev: Add bounds checking in bit_putcs to fix vmalloc-out-of-bounds Add bounds checking to prevent writes past framebuffer boundaries when rendering text near screen edges. Return early if the Y position is off-screen and clip image height to screen boundary. Break from the rendering loop if the X position is off-screen. When clipping image width to fit the screen, update the character count to match the clipped width to prevent buffer size mismatches. Without the character count update, bit_putcs_aligned and bit_putcs_unaligned receive mismatched parameters where the buffer is allocated for the clipped width but cnt reflects the original larger count, causing out-of-bounds writes.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].

URL Source(s) Tag(s)
https://git.kernel.org/stable/c/15ba9acafb0517f8359ca30002c189a68ddbb939 kernel.org
https://git.kernel.org/stable/c/1943b69e87b0ab35032d47de0a7fca9a3d1d6fc1 kernel.org
https://git.kernel.org/stable/c/2d1359e11674ed4274934eac8a71877ae5ae7bbb kernel.org
https://git.kernel.org/stable/c/3637d34b35b287ab830e66048841ace404382b67 kernel.org
https://git.kernel.org/stable/c/86df8ade88d290725554cefd03101ecd0fbd3752 kernel.org
https://git.kernel.org/stable/c/996bfaa7372d6718b6d860bdf78f6618e850c702 kernel.org
https://git.kernel.org/stable/c/ebc0730b490c7f27340b1222e01dd106e820320d kernel.org
https://git.kernel.org/stable/c/f0982400648a3e00580253e0c48e991f34d2684c kernel.org

Weakness Enumeration

CWE-ID CWE Name Source

Change History

1 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2025-40304
NVD Published Date:
12/07/2025
NVD Last Modified:
12/07/2025
Source:
kernel.org