-

CVE-2025-68750

In the Linux kernel, the following vulnerability has been resolved:

usb: potential integer overflow in usbg_make_tpg()

The variable tpgt in usbg_make_tpg() is defined as unsigned long and is
assigned to tpgt->tport_tpgt, which is defined as u16. This may cause an
integer overflow when tpgt is greater than USHRT_MAX (65535). I
haven't tried to trigger it myself, but it is possible to trigger it
by calling usbg_make_tpg() with a large value for tpgt.

I modified the type of tpgt to match tpgt->tport_tpgt and adjusted the
relevant code accordingly.

This patch is similar to commit 59c816c1f24d ("vhost/scsi: potential
memory corruption").
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < 0861b9cb2ff519b7c5a3b1dd52a343e18c4efb24
Version c52661d60f636d17e26ad834457db333bd1df494
Status affected
Version < 603a83e5fee38a950bfcfb2f36449311fa00a474
Version c52661d60f636d17e26ad834457db333bd1df494
Status affected
Version < 6f77e344515b5258edb3988188311464209b1c7c
Version c52661d60f636d17e26ad834457db333bd1df494
Status affected
Version < 6722e080b5b39ab7471386c73d0c1b39572f943c
Version c52661d60f636d17e26ad834457db333bd1df494
Status affected
Version < a33f507f36d5881f602dab581ab0f8d22b49762c
Version c52661d60f636d17e26ad834457db333bd1df494
Status affected
Version < 358d5ba08f1609c34a054aed88c431844d09705a
Version c52661d60f636d17e26ad834457db333bd1df494
Status affected
Version < 620a5e1e84a3a7004270703a118d33eeb1c0f368
Version c52661d60f636d17e26ad834457db333bd1df494
Status affected
Version < 153874010354d050f62f8ae25cbb960c17633dc5
Version c52661d60f636d17e26ad834457db333bd1df494
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 3.5
Status affected
Version < 3.5
Version 0
Status unaffected
Version <= 5.4.*
Version 5.4.296
Status unaffected
Version <= 5.10.*
Version 5.10.240
Status unaffected
Version <= 5.15.*
Version 5.15.187
Status unaffected
Version <= 6.1.*
Version 6.1.143
Status unaffected
Version <= 6.6.*
Version 6.6.96
Status unaffected
Version <= 6.12.*
Version 6.12.36
Status unaffected
Version <= 6.15.*
Version 6.15.5
Status unaffected
Version <= *
Version 6.16
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.04% 0.1
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
Es wurden noch keine Informationen zu CWE veröffentlicht.