-

CVE-2025-68724

In the Linux kernel, the following vulnerability has been resolved:

crypto: asymmetric_keys - prevent overflow in asymmetric_key_generate_id

Use check_add_overflow() to guard against potential integer overflows
when adding the binary blob lengths and the size of an asymmetric_key_id
structure and return ERR_PTR(-EOVERFLOW) accordingly. This prevents a
possible buffer overflow when copying data from potentially malicious
X.509 certificate fields that can be arbitrarily large, such as ASN.1
INTEGER serial numbers, issuer names, etc.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < 60a7be5ee74408147e439164ac067e418ca74bb4
Version 7901c1a8effbe5f89673bfc09d6e37b8f334f1a7
Status affected
Version < c13c6e9de91d7f1dd7df756b1fa5a1f968839d76
Version 7901c1a8effbe5f89673bfc09d6e37b8f334f1a7
Status affected
Version < dfc1613961828745165aec6552c3818fa14ab725
Version 7901c1a8effbe5f89673bfc09d6e37b8f334f1a7
Status affected
Version < 5b8ac617c8dab5cad3c4dc8d84d0987808a0f99c
Version 7901c1a8effbe5f89673bfc09d6e37b8f334f1a7
Status affected
Version < c73be4f51eed98fa0c7c189db8f279e1c86bfbf7
Version 7901c1a8effbe5f89673bfc09d6e37b8f334f1a7
Status affected
Version < 6af753ac5205115e6c310c8c4236c01b59a1c44f
Version 7901c1a8effbe5f89673bfc09d6e37b8f334f1a7
Status affected
Version < b7090a5c153105b9fd221a5a81459ee8cd5babd6
Version 7901c1a8effbe5f89673bfc09d6e37b8f334f1a7
Status affected
Version < df0845cf447ae1556c3440b8b155de0926cbaa56
Version 7901c1a8effbe5f89673bfc09d6e37b8f334f1a7
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 3.18
Status affected
Version < 3.18
Version 0
Status unaffected
Version <= 5.10.*
Version 5.10.248
Status unaffected
Version <= 5.15.*
Version 5.15.198
Status unaffected
Version <= 6.1.*
Version 6.1.160
Status unaffected
Version <= 6.6.*
Version 6.6.120
Status unaffected
Version <= 6.12.*
Version 6.12.63
Status unaffected
Version <= 6.17.*
Version 6.17.13
Status unaffected
Version <= 6.18.*
Version 6.18.2
Status unaffected
Version <= *
Version 6.19-rc1
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.03% 0.061
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
Es wurden noch keine Informationen zu CWE veröffentlicht.