CVE-2025-37851 (GCVE-0-2025-37851)
Vulnerability from cvelistv5
Published
2025-05-09 06:41
Modified
2025-05-26 05:22
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: fbdev: omapfb: Add 'plane' value check Function dispc_ovl_setup is not intended to work with the value OMAP_DSS_WB of the enum parameter plane. The value of this parameter is initialized in dss_init_overlays and in the current state of the code it cannot take this value so it's not a real problem. For the purposes of defensive coding it wouldn't be superfluous to check the parameter value, because some functions down the call stack process this value correctly and some not. For example, in dispc_ovl_setup_global_alpha it may lead to buffer overflow. Add check for this value. Found by Linux Verification Center (linuxtesting.org) with SVACE static analysis tool.
Impacted products
Vendor Product Version
Linux Linux Version: 559d67018950ced65c73358cd69c4bdd2b0c5dd6
Version: 559d67018950ced65c73358cd69c4bdd2b0c5dd6
Version: 559d67018950ced65c73358cd69c4bdd2b0c5dd6
Version: 559d67018950ced65c73358cd69c4bdd2b0c5dd6
Version: 559d67018950ced65c73358cd69c4bdd2b0c5dd6
Version: 559d67018950ced65c73358cd69c4bdd2b0c5dd6
Version: 559d67018950ced65c73358cd69c4bdd2b0c5dd6
Version: 559d67018950ced65c73358cd69c4bdd2b0c5dd6
Version: 559d67018950ced65c73358cd69c4bdd2b0c5dd6
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/video/fbdev/omap2/omapfb/dss/dispc.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "a570efb4d877adbf3db2dc95487f2ba6bfdd148a",
              "status": "affected",
              "version": "559d67018950ced65c73358cd69c4bdd2b0c5dd6",
              "versionType": "git"
            },
            {
              "lessThan": "cdf41d72e8b015d9ea68f5a1c0a79624e7c312aa",
              "status": "affected",
              "version": "559d67018950ced65c73358cd69c4bdd2b0c5dd6",
              "versionType": "git"
            },
            {
              "lessThan": "09dbf22fd68c2f1a81ab89670ffa1ec3033436c4",
              "status": "affected",
              "version": "559d67018950ced65c73358cd69c4bdd2b0c5dd6",
              "versionType": "git"
            },
            {
              "lessThan": "660a53a0694d1f3789802509fe729dd4656fc5e0",
              "status": "affected",
              "version": "559d67018950ced65c73358cd69c4bdd2b0c5dd6",
              "versionType": "git"
            },
            {
              "lessThan": "fda15c5b96b883d62fb2d84a3a1422aa87717897",
              "status": "affected",
              "version": "559d67018950ced65c73358cd69c4bdd2b0c5dd6",
              "versionType": "git"
            },
            {
              "lessThan": "52eafaa56f8f6d6a0cdff9282b25b4acbde34edc",
              "status": "affected",
              "version": "559d67018950ced65c73358cd69c4bdd2b0c5dd6",
              "versionType": "git"
            },
            {
              "lessThan": "9b0a41589ee70529b20e1e0108d03f10c649bdc4",
              "status": "affected",
              "version": "559d67018950ced65c73358cd69c4bdd2b0c5dd6",
              "versionType": "git"
            },
            {
              "lessThan": "4efd8ef5e40f2c7a4a91a5a9f03140bfa827da89",
              "status": "affected",
              "version": "559d67018950ced65c73358cd69c4bdd2b0c5dd6",
              "versionType": "git"
            },
            {
              "lessThan": "3e411827f31db7f938a30a3c7a7599839401ec30",
              "status": "affected",
              "version": "559d67018950ced65c73358cd69c4bdd2b0c5dd6",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "drivers/video/fbdev/omap2/omapfb/dss/dispc.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "2.6.33"
            },
            {
              "lessThan": "2.6.33",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.4.*",
              "status": "unaffected",
              "version": "5.4.293",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.10.*",
              "status": "unaffected",
              "version": "5.10.237",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.15.*",
              "status": "unaffected",
              "version": "5.15.181",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.*",
              "status": "unaffected",
              "version": "6.1.135",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.6.*",
              "status": "unaffected",
              "version": "6.6.88",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.12.*",
              "status": "unaffected",
              "version": "6.12.24",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.13.*",
              "status": "unaffected",
              "version": "6.13.12",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.14.*",
              "status": "unaffected",
              "version": "6.14.3",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.15",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.4.293",
                  "versionStartIncluding": "2.6.33",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.10.237",
                  "versionStartIncluding": "2.6.33",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.15.181",
                  "versionStartIncluding": "2.6.33",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.1.135",
                  "versionStartIncluding": "2.6.33",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.6.88",
                  "versionStartIncluding": "2.6.33",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.12.24",
                  "versionStartIncluding": "2.6.33",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.13.12",
                  "versionStartIncluding": "2.6.33",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.14.3",
                  "versionStartIncluding": "2.6.33",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.15",
                  "versionStartIncluding": "2.6.33",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nfbdev: omapfb: Add \u0027plane\u0027 value check\n\nFunction dispc_ovl_setup is not intended to work with the value OMAP_DSS_WB\nof the enum parameter plane.\n\nThe value of this parameter is initialized in dss_init_overlays and in the\ncurrent state of the code it cannot take this value so it\u0027s not a real\nproblem.\n\nFor the purposes of defensive coding it wouldn\u0027t be superfluous to check\nthe parameter value, because some functions down the call stack process\nthis value correctly and some not.\n\nFor example, in dispc_ovl_setup_global_alpha it may lead to buffer\noverflow.\n\nAdd check for this value.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE static\nanalysis tool."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-26T05:22:17.231Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/a570efb4d877adbf3db2dc95487f2ba6bfdd148a"
        },
        {
          "url": "https://git.kernel.org/stable/c/cdf41d72e8b015d9ea68f5a1c0a79624e7c312aa"
        },
        {
          "url": "https://git.kernel.org/stable/c/09dbf22fd68c2f1a81ab89670ffa1ec3033436c4"
        },
        {
          "url": "https://git.kernel.org/stable/c/660a53a0694d1f3789802509fe729dd4656fc5e0"
        },
        {
          "url": "https://git.kernel.org/stable/c/fda15c5b96b883d62fb2d84a3a1422aa87717897"
        },
        {
          "url": "https://git.kernel.org/stable/c/52eafaa56f8f6d6a0cdff9282b25b4acbde34edc"
        },
        {
          "url": "https://git.kernel.org/stable/c/9b0a41589ee70529b20e1e0108d03f10c649bdc4"
        },
        {
          "url": "https://git.kernel.org/stable/c/4efd8ef5e40f2c7a4a91a5a9f03140bfa827da89"
        },
        {
          "url": "https://git.kernel.org/stable/c/3e411827f31db7f938a30a3c7a7599839401ec30"
        }
      ],
      "title": "fbdev: omapfb: Add \u0027plane\u0027 value check",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2025-37851",
    "datePublished": "2025-05-09T06:41:58.466Z",
    "dateReserved": "2025-04-16T04:51:23.955Z",
    "dateUpdated": "2025-05-26T05:22:17.231Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2025-37851\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-05-09T07:16:06.003\",\"lastModified\":\"2025-05-12T17:32:52.810\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nfbdev: omapfb: Add \u0027plane\u0027 value check\\n\\nFunction dispc_ovl_setup is not intended to work with the value OMAP_DSS_WB\\nof the enum parameter plane.\\n\\nThe value of this parameter is initialized in dss_init_overlays and in the\\ncurrent state of the code it cannot take this value so it\u0027s not a real\\nproblem.\\n\\nFor the purposes of defensive coding it wouldn\u0027t be superfluous to check\\nthe parameter value, because some functions down the call stack process\\nthis value correctly and some not.\\n\\nFor example, in dispc_ovl_setup_global_alpha it may lead to buffer\\noverflow.\\n\\nAdd check for this value.\\n\\nFound by Linux Verification Center (linuxtesting.org) with SVACE static\\nanalysis tool.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: fbdev: omapfb: A\u00f1adir comprobaci\u00f3n del valor \\\"plane\\\". La funci\u00f3n dispc_ovl_setup no est\u00e1 dise\u00f1ada para funcionar con el valor OMAP_DSS_WB del par\u00e1metro de enumeraci\u00f3n \\\"plane\\\". Este valor se inicializa en dss_init_overlays y, en el estado actual del c\u00f3digo, no puede tomar este valor, por lo que no supone un problema real. Para fines de codificaci\u00f3n defensiva, no ser\u00eda superfluo comprobar el valor del par\u00e1metro, ya que algunas funciones en la pila de llamadas procesan este valor correctamente y otras no. Por ejemplo, en dispc_ovl_setup_global_alpha, puede provocar un desbordamiento de b\u00fafer. A\u00f1adir comprobaci\u00f3n para este valor. Encontrado por el Centro de Verificaci\u00f3n de Linux (linuxtesting.org) con la herramienta de an\u00e1lisis est\u00e1tico SVACE.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/09dbf22fd68c2f1a81ab89670ffa1ec3033436c4\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/3e411827f31db7f938a30a3c7a7599839401ec30\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/4efd8ef5e40f2c7a4a91a5a9f03140bfa827da89\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/52eafaa56f8f6d6a0cdff9282b25b4acbde34edc\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/660a53a0694d1f3789802509fe729dd4656fc5e0\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/9b0a41589ee70529b20e1e0108d03f10c649bdc4\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/a570efb4d877adbf3db2dc95487f2ba6bfdd148a\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/cdf41d72e8b015d9ea68f5a1c0a79624e7c312aa\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/fda15c5b96b883d62fb2d84a3a1422aa87717897\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…