
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2025-38213 was discovered in the Linux kernel, specifically affecting the vgacon component. The vulnerability was identified on July 4, 2025, and involves a slab-out-of-bounds issue in the vgacon_scroll() function (NVD, CVE).
The vulnerability manifests as a slab-out-of-bounds read in the vcsscrreadw function (drivers/tty/vt/vt.c:4740). The issue was discovered through Syzkaller testing, which reported a KASAN (Kernel Address Sanitizer) bug showing a read of size 2 at address ffff88800f5bef60. The vulnerability specifically relates to how the vcorigin address range is handled in the vgaconscroll() function (NVD).
The vulnerability could lead to memory disclosure through an out-of-bounds read operation, potentially exposing sensitive kernel memory contents. This could compromise system security by allowing attackers to access unauthorized memory regions (NVD).
A fix has been implemented by adding a check for the vcorigin address range in the vgaconscroll() function. Multiple Linux distributions have released patches to address this vulnerability, including Debian which has fixed versions available in their trixie and sid releases (Debian).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."