VYPR
Unrated severityNVD Advisory· Published Dec 8, 2025· Updated Apr 15, 2026

CVE-2025-40322

CVE-2025-40322

Description

In the Linux kernel, the following vulnerability has been resolved:

fbdev: bitblit: bound-check glyph index in bit_putcs*

bit_putcs_aligned()/unaligned() derived the glyph pointer from the character value masked by 0xff/0x1ff, which may exceed the actual font's glyph count and read past the end of the built-in font array. Clamp the index to the actual glyph count before computing the address.

This fixes a global out-of-bounds read reported by syzbot.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A global out-of-bounds read in fbdev bitblit functions allows reading past font array, fixed by clamping glyph index.

Vulnerability

Analysis

In the Linux kernel's framebuffer subsystem, the bitblit functions bit_putcs_aligned() and bit_putcs_unaligned() derived a glyph pointer from the character value after masking it by 0xff or 0x1ff. This mask did not account for the actual number of glyphs in the built-in font, allowing an out-of-bounds read past the end of the font array. The vulnerability is a global out-of-bounds read, reported by syzbot.

Exploitation

The issue can be triggered by rendering text that uses a character code exceeding the font's glyph count. No special privileges are required; any process that writes to the framebuffer console could potentially trigger the read. The attacker must be able to control the character data rendered, which may be possible from user space via console operations.

Impact

An attacker exploiting this bug could read kernel memory past the font array, potentially leaking sensitive information. The out-of-bounds read is limited to adjacent memory, but could be used to obtain kernel addresses or other data, aiding in further exploitation. The bug does not directly allow code execution, but the information leak can bypass KASLR.

Mitigation

The fix, applied in stable kernel commits [1][2][3], clamps the glyph index to the actual glyph count before computing the pointer address. Users should update their kernel to a version containing the fix, such as 6.12 or later stable releases. No workaround is available; a kernel upgrade is required.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2
  • Linux/Kernelinferred2 versions
    (expand)+ 1 more
    • (no CPE)
    • (no CPE)

Patches

8

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

8

News mentions

0

No linked articles in our index yet.