-
CVE-2025-68792
- EPSS 0.02%
- Veröffentlicht 13.01.2026 15:29:04
- Zuletzt bearbeitet 17.01.2026 16:16:05
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
In the Linux kernel, the following vulnerability has been resolved: tpm2-sessions: Fix out of range indexing in name_size 'name_size' does not have any range checks, and it just directly indexes with TPM_ALG_ID, which could lead into memory corruption at worst. Address the issue by only processing known values and returning -EINVAL for unrecognized values. Make also 'tpm_buf_append_name' and 'tpm_buf_fill_hmac_session' fallible so that errors are detected before causing any spurious TPM traffic. End also the authorization session on failure in both of the functions, as the session state would be then by definition corrupted.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
47e676ce4d68f461dfcab906f6aeb254f7276deb
Version
1085b8276bb4239daa7008f0dcd5c973e4bd690f
Status
affected
Version <
04a3aa6e8c5f878cc51a8a1c90b6d3c54079bc43
Version
1085b8276bb4239daa7008f0dcd5c973e4bd690f
Status
affected
Version <
6e9722e9a7bfe1bbad649937c811076acf86e1fd
Version
1085b8276bb4239daa7008f0dcd5c973e4bd690f
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
6.10
Status
affected
Version <
6.10
Version
0
Status
unaffected
Version <=
6.12.*
Version
6.12.66
Status
unaffected
Version <=
6.18.*
Version
6.18.3
Status
unaffected
Version <=
*
Version
6.19-rc1
Status
unaffected
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.02% | 0.05 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|