-
CVE-2025-68308
- EPSS 0.04%
- Veröffentlicht 16.12.2025 15:06:25
- Zuletzt bearbeitet 18.12.2025 15:08:06
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
In the Linux kernel, the following vulnerability has been resolved: can: kvaser_usb: leaf: Fix potential infinite loop in command parsers The `kvaser_usb_leaf_wait_cmd()` and `kvaser_usb_leaf_read_bulk_callback` functions contain logic to zero-length commands. These commands are used to align data to the USB endpoint's wMaxPacketSize boundary. The driver attempts to skip these placeholders by aligning the buffer position `pos` to the next packet boundary using `round_up()` function. However, if zero-length command is found exactly on a packet boundary (i.e., `pos` is a multiple of wMaxPacketSize, including 0), `round_up` function will return the unchanged value of `pos`. This prevents `pos` to be increased, causing an infinite loop in the parsing logic. This patch fixes this in the function by using `pos + 1` instead. This ensures that even if `pos` is on a boundary, the calculation is based on `pos + 1`, forcing `round_up()` to always return the next aligned boundary.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
58343e0a4d43699f0e2f5b169384bbe4c0217add
Version
7259124eac7d1b76b41c7a9cb2511a30556deebe
Status
affected
Version <
69c7825df64e24dc15d31631a1fc9145324b1345
Version
7259124eac7d1b76b41c7a9cb2511a30556deebe
Status
affected
Version <
028e89c7e8b4346302e88df01cc50e0a1f05791a
Version
7259124eac7d1b76b41c7a9cb2511a30556deebe
Status
affected
Version <
e9dd83a75a7274edef21682c823bf0b66d7b6b7f
Version
7259124eac7d1b76b41c7a9cb2511a30556deebe
Status
affected
Version <
0897cea266e39166a36111059ba147192b36592f
Version
7259124eac7d1b76b41c7a9cb2511a30556deebe
Status
affected
Version <
bd8135a560cf6e64f0b98ed4daadf126a38f7f48
Version
7259124eac7d1b76b41c7a9cb2511a30556deebe
Status
affected
Version <
0c73772cd2b8cc108d5f5334de89ad648d89b9ec
Version
7259124eac7d1b76b41c7a9cb2511a30556deebe
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
4.19
Status
affected
Version <
4.19
Version
0
Status
unaffected
Version <=
5.10.*
Version
5.10.247
Status
unaffected
Version <=
5.15.*
Version
5.15.197
Status
unaffected
Version <=
6.1.*
Version
6.1.159
Status
unaffected
Version <=
6.6.*
Version
6.6.119
Status
unaffected
Version <=
6.12.*
Version
6.12.61
Status
unaffected
Version <=
6.17.*
Version
6.17.11
Status
unaffected
Version <=
*
Version
6.18
Status
unaffected
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.04% | 0.119 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|