CVE-2025-38198
📋 TL;DR
This CVE describes an array index out-of-bounds vulnerability in the Linux kernel's fbcon (framebuffer console) subsystem. When writing to the 'store_modes' sysfs node on an unregistered console, the kernel can access invalid memory, potentially leading to kernel panic or local privilege escalation. This affects Linux systems with framebuffer console enabled.
💻 Affected Systems
- Linux kernel
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Kernel panic causing system crash, or local privilege escalation allowing attackers to gain root access and execute arbitrary code.
Likely Case
Kernel panic leading to denial of service, requiring system reboot to restore functionality.
If Mitigated
System remains stable with proper access controls preventing unauthorized users from writing to sysfs nodes.
🎯 Exploit Status
Exploitation requires local access and ability to write to /sys/class/graphics/fb*/store_modes. The vulnerability was discovered through UBSAN (Undefined Behavior Sanitizer) testing.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Kernel versions containing commits: 519ba75728ee8cd561dce25fc52a2ec5c47171dc, 54b28f7c567dd659e5f9562f518e4d7f3f6a367b, b3237d451bf3a4490cb1a76f3b7c91d9888f1c4b, cedc1b63394a866bf8663a3e40f4546f1d28c8d8, f28f1f578cd810779d01999c60618cda14c281fd
Vendor Advisory: https://git.kernel.org/stable/c/519ba75728ee8cd561dce25fc52a2ec5c47171dc
Restart Required: Yes
Instructions:
1. Update Linux kernel to version containing the fix commits. 2. For distributions: Use package manager (apt/yum/dnf) to update kernel package. 3. Reboot system to load new kernel.
🔧 Temporary Workarounds
Restrict sysfs access
linuxPrevent unauthorized users from writing to fbcon sysfs nodes
chmod 644 /sys/class/graphics/fb*/store_modes
chown root:root /sys/class/graphics/fb*/store_modes
Disable framebuffer console
linuxRemove fbcon module if not needed
rmmod fbcon
echo 'blacklist fbcon' >> /etc/modprobe.d/blacklist.conf
🧯 If You Can't Patch
- Implement strict access controls on /sys/class/graphics/fb* directories
- Monitor for unauthorized access attempts to sysfs fbcon nodes
🔍 How to Verify
Check if Vulnerable:
Check kernel version and if fbcon module is loaded: lsmod | grep fbcon
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version contains fix commits: uname -r and check with distribution vendor
📡 Detection & Monitoring
Log Indicators:
- Kernel panic messages
- UBSAN array-index-out-of-bounds errors in kernel logs
- Access denied errors for /sys/class/graphics/fb*/store_modes
Network Indicators:
- None - local vulnerability only
SIEM Query:
source="kernel" AND ("array-index-out-of-bounds" OR "fbcon" OR "UBSAN")
🔗 References
- https://git.kernel.org/stable/c/519ba75728ee8cd561dce25fc52a2ec5c47171dc
- https://git.kernel.org/stable/c/54b28f7c567dd659e5f9562f518e4d7f3f6a367b
- https://git.kernel.org/stable/c/b3237d451bf3a4490cb1a76f3b7c91d9888f1c4b
- https://git.kernel.org/stable/c/cedc1b63394a866bf8663a3e40f4546f1d28c8d8
- https://git.kernel.org/stable/c/f28f1f578cd810779d01999c60618cda14c281dd
- https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html