-
CVE-2025-68308
- EPSS 0.03%
- Veröffentlicht 16.12.2025 15:06:25
- Zuletzt bearbeitet 15.04.2026 00:35:42
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
can: kvaser_usb: leaf: Fix potential infinite loop in command parsers
In the Linux kernel, the following vulnerability has been resolved: can: kvaser_usb: leaf: Fix potential infinite loop in command parsers The `kvaser_usb_leaf_wait_cmd()` and `kvaser_usb_leaf_read_bulk_callback` functions contain logic to zero-length commands. These commands are used to align data to the USB endpoint's wMaxPacketSize boundary. The driver attempts to skip these placeholders by aligning the buffer position `pos` to the next packet boundary using `round_up()` function. However, if zero-length command is found exactly on a packet boundary (i.e., `pos` is a multiple of wMaxPacketSize, including 0), `round_up` function will return the unchanged value of `pos`. This prevents `pos` to be increased, causing an infinite loop in the parsing logic. This patch fixes this in the function by using `pos + 1` instead. This ensures that even if `pos` is on a boundary, the calculation is based on `pos + 1`, forcing `round_up()` to always return the next aligned boundary.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version
7259124eac7d1b76b41c7a9cb2511a30556deebe
Version <
58343e0a4d43699f0e2f5b169384bbe4c0217add
Status
affected
Version
7259124eac7d1b76b41c7a9cb2511a30556deebe
Version <
69c7825df64e24dc15d31631a1fc9145324b1345
Status
affected
Version
7259124eac7d1b76b41c7a9cb2511a30556deebe
Version <
028e89c7e8b4346302e88df01cc50e0a1f05791a
Status
affected
Version
7259124eac7d1b76b41c7a9cb2511a30556deebe
Version <
e9dd83a75a7274edef21682c823bf0b66d7b6b7f
Status
affected
Version
7259124eac7d1b76b41c7a9cb2511a30556deebe
Version <
0897cea266e39166a36111059ba147192b36592f
Status
affected
Version
7259124eac7d1b76b41c7a9cb2511a30556deebe
Version <
bd8135a560cf6e64f0b98ed4daadf126a38f7f48
Status
affected
Version
7259124eac7d1b76b41c7a9cb2511a30556deebe
Version <
0c73772cd2b8cc108d5f5334de89ad648d89b9ec
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
4.19
Status
affected
Version
0
Version <
4.19
Status
unaffected
Version <=
5.10.*
Version
5.10.247
Status
unaffected
Version <=
5.15.*
Version
5.15.197
Status
unaffected
Version <=
6.1.*
Version
6.1.159
Status
unaffected
Version <=
6.6.*
Version
6.6.119
Status
unaffected
Version <=
6.12.*
Version
6.12.61
Status
unaffected
Version <=
6.17.*
Version
6.17.11
Status
unaffected
Version <=
*
Version
6.18
Status
unaffected
VulnDex Vulnerability Enrichment
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.03% | 0.099 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|