-

CVE-2025-68799

In the Linux kernel, the following vulnerability has been resolved:

caif: fix integer underflow in cffrml_receive()

The cffrml_receive() function extracts a length field from the packet
header and, when FCS is disabled, subtracts 2 from this length without
validating that len >= 2.

If an attacker sends a malicious packet with a length field of 0 or 1
to an interface with FCS disabled, the subtraction causes an integer
underflow.

This can lead to memory exhaustion and kernel instability, potential
information disclosure if padding contains uninitialized kernel memory.

Fix this by validating that len >= 2 before performing the subtraction.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < f407f1c9f45bbf5c99fd80b3f3f4a94fdbe35691
Version b482cd2053e3b90a7b33a78c63cdb6badf2ec383
Status affected
Version < c54091eec6fed19e94182aa05dd6846600a642f7
Version b482cd2053e3b90a7b33a78c63cdb6badf2ec383
Status affected
Version < 785c7be6361630070790f6235b696da156ac71b3
Version b482cd2053e3b90a7b33a78c63cdb6badf2ec383
Status affected
Version < f818cd472565f8b0c2c409b040e0121c5cf8592c
Version b482cd2053e3b90a7b33a78c63cdb6badf2ec383
Status affected
Version < 4ec29714aa4e0601ea29d2f02b461fc0ac92c2c3
Version b482cd2053e3b90a7b33a78c63cdb6badf2ec383
Status affected
Version < 21fdcc00656a60af3c7aae2dea8dd96abd35519c
Version b482cd2053e3b90a7b33a78c63cdb6badf2ec383
Status affected
Version < 8a11ff0948b5ad09b71896b7ccc850625f9878d1
Version b482cd2053e3b90a7b33a78c63cdb6badf2ec383
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 2.6.35
Status affected
Version < 2.6.35
Version 0
Status unaffected
Version <= 5.10.*
Version 5.10.248
Status unaffected
Version <= 5.15.*
Version 5.15.198
Status unaffected
Version <= 6.1.*
Version 6.1.160
Status unaffected
Version <= 6.6.*
Version 6.6.120
Status unaffected
Version <= 6.12.*
Version 6.12.64
Status unaffected
Version <= 6.18.*
Version 6.18.3
Status unaffected
Version <= *
Version 6.19-rc2
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.03% 0.088
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
Es wurden noch keine Informationen zu CWE veröffentlicht.