-
CVE-2025-68237
- EPSS 0.05%
- Veröffentlicht 16.12.2025 14:15:58
- Zuletzt bearbeitet 18.12.2025 15:08:06
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
In the Linux kernel, the following vulnerability has been resolved: mtdchar: fix integer overflow in read/write ioctls The "req.start" and "req.len" variables are u64 values that come from the user at the start of the function. We mask away the high 32 bits of "req.len" so that's capped at U32_MAX but the "req.start" variable can go up to U64_MAX which means that the addition can still integer overflow. Use check_add_overflow() to fix this bug.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
f37efdd97fd1ec3e0d0f1eec279c8279e28f981e
Version
6420ac0af95dbcb2fd8452e2d551ab50e1bbad83
Status
affected
Version <
457376c6fbf0c69326a9bf1f72416225f681192b
Version
6420ac0af95dbcb2fd8452e2d551ab50e1bbad83
Status
affected
Version <
eb9361484814fb12f3b7544b33835ea67d7a6a97
Version
6420ac0af95dbcb2fd8452e2d551ab50e1bbad83
Status
affected
Version <
37944f4f8199cd153fef74e95ca268020162f212
Version
6420ac0af95dbcb2fd8452e2d551ab50e1bbad83
Status
affected
Version <
e4185bed738da755b191aa3f2e16e8b48450e1b8
Version
6420ac0af95dbcb2fd8452e2d551ab50e1bbad83
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
5.17
Status
affected
Version <
5.17
Version
0
Status
unaffected
Version <=
6.1.*
Version
6.1.159
Status
unaffected
Version <=
6.6.*
Version
6.6.118
Status
unaffected
Version <=
6.12.*
Version
6.12.60
Status
unaffected
Version <=
6.17.*
Version
6.17.10
Status
unaffected
Version <=
*
Version
6.18
Status
unaffected
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.05% | 0.136 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|