-
CVE-2025-68816
- EPSS 0.03%
- Veröffentlicht 13.01.2026 15:29:20
- Zuletzt bearbeitet 19.01.2026 13:16:15
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
In the Linux kernel, the following vulnerability has been resolved: net/mlx5: fw_tracer, Validate format string parameters Add validation for format string parameters in the firmware tracer to prevent potential security vulnerabilities and crashes from malformed format strings received from firmware. The firmware tracer receives format strings from the device firmware and uses them to format trace messages. Without proper validation, bad firmware could provide format strings with invalid format specifiers (e.g., %s, %p, %n) that could lead to crashes, or other undefined behavior. Add mlx5_tracer_validate_params() to validate that all format specifiers in trace strings are limited to safe integer/hex formats (%x, %d, %i, %u, %llx, %lx, etc.). Reject strings containing other format types that could be used to access arbitrary memory or cause crashes. Invalid format strings are added to the trace output for visibility with "BAD_FORMAT: " prefix.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
95624b731c490a4b849844269193a233d6d556a0
Version
70dd6fdb8987b14f7b6105f6be0617299e459398
Status
affected
Version <
768d559f466cdd72849110a7ecd76a21d52dcfe3
Version
70dd6fdb8987b14f7b6105f6be0617299e459398
Status
affected
Version <
38ac688b52ef26a88f8bc4fe26d24fdd0ff91e5d
Version
70dd6fdb8987b14f7b6105f6be0617299e459398
Status
affected
Version <
8ac688c0e430dab19f6a9b70df94b1f635612c1a
Version
70dd6fdb8987b14f7b6105f6be0617299e459398
Status
affected
Version <
45bd283b1d69e2c97cddcb9956f0e0261fc4efd7
Version
70dd6fdb8987b14f7b6105f6be0617299e459398
Status
affected
Version <
8c35c2448086870509ede43947845be0833251f0
Version
70dd6fdb8987b14f7b6105f6be0617299e459398
Status
affected
Version <
b35966042d20b14e2d83330049f77deec5229749
Version
70dd6fdb8987b14f7b6105f6be0617299e459398
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
4.19
Status
affected
Version <
4.19
Version
0
Status
unaffected
Version <=
5.10.*
Version
5.10.248
Status
unaffected
Version <=
5.15.*
Version
5.15.198
Status
unaffected
Version <=
6.1.*
Version
6.1.160
Status
unaffected
Version <=
6.6.*
Version
6.6.120
Status
unaffected
Version <=
6.12.*
Version
6.12.64
Status
unaffected
Version <=
6.18.*
Version
6.18.3
Status
unaffected
Version <=
*
Version
6.19-rc2
Status
unaffected
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.03% | 0.088 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|