-
CVE-2025-68750
- EPSS 0.04%
- Veröffentlicht 24.12.2025 15:51:03
- Zuletzt bearbeitet 29.12.2025 15:58:13
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
In the Linux kernel, the following vulnerability has been resolved:
usb: potential integer overflow in usbg_make_tpg()
The variable tpgt in usbg_make_tpg() is defined as unsigned long and is
assigned to tpgt->tport_tpgt, which is defined as u16. This may cause an
integer overflow when tpgt is greater than USHRT_MAX (65535). I
haven't tried to trigger it myself, but it is possible to trigger it
by calling usbg_make_tpg() with a large value for tpgt.
I modified the type of tpgt to match tpgt->tport_tpgt and adjusted the
relevant code accordingly.
This patch is similar to commit 59c816c1f24d ("vhost/scsi: potential
memory corruption").Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
0861b9cb2ff519b7c5a3b1dd52a343e18c4efb24
Version
c52661d60f636d17e26ad834457db333bd1df494
Status
affected
Version <
603a83e5fee38a950bfcfb2f36449311fa00a474
Version
c52661d60f636d17e26ad834457db333bd1df494
Status
affected
Version <
6f77e344515b5258edb3988188311464209b1c7c
Version
c52661d60f636d17e26ad834457db333bd1df494
Status
affected
Version <
6722e080b5b39ab7471386c73d0c1b39572f943c
Version
c52661d60f636d17e26ad834457db333bd1df494
Status
affected
Version <
a33f507f36d5881f602dab581ab0f8d22b49762c
Version
c52661d60f636d17e26ad834457db333bd1df494
Status
affected
Version <
358d5ba08f1609c34a054aed88c431844d09705a
Version
c52661d60f636d17e26ad834457db333bd1df494
Status
affected
Version <
620a5e1e84a3a7004270703a118d33eeb1c0f368
Version
c52661d60f636d17e26ad834457db333bd1df494
Status
affected
Version <
153874010354d050f62f8ae25cbb960c17633dc5
Version
c52661d60f636d17e26ad834457db333bd1df494
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
3.5
Status
affected
Version <
3.5
Version
0
Status
unaffected
Version <=
5.4.*
Version
5.4.296
Status
unaffected
Version <=
5.10.*
Version
5.10.240
Status
unaffected
Version <=
5.15.*
Version
5.15.187
Status
unaffected
Version <=
6.1.*
Version
6.1.143
Status
unaffected
Version <=
6.6.*
Version
6.6.96
Status
unaffected
Version <=
6.12.*
Version
6.12.36
Status
unaffected
Version <=
6.15.*
Version
6.15.5
Status
unaffected
Version <=
*
Version
6.16
Status
unaffected
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.04% | 0.1 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|