CVE-2025-68750
EUVD-2025-20529124.12.2025, 16:15
In the Linux kernel, the following vulnerability has been resolved:
usb: potential integer overflow in usbg_make_tpg()
The variable tpgt in usbg_make_tpg() is defined as unsigned long and is
assigned to tpgt->tport_tpgt, which is defined as u16. This may cause an
integer overflow when tpgt is greater than USHRT_MAX (65535). I
haven't tried to trigger it myself, but it is possible to trigger it
by calling usbg_make_tpg() with a large value for tpgt.
I modified the type of tpgt to match tpgt->tport_tpgt and adjusted the
relevant code accordingly.
This patch is similar to commit 59c816c1f24d ("vhost/scsi: potential
memory corruption").EnginsightAwaiting analysis
This vulnerability is currently awaiting analysis.
Debian Releases
openSUSE / SLES Releases
openSUSE Product | |||||||||
|---|---|---|---|---|---|---|---|---|---|
| cluster-md-kmp-default |
| ||||||||
| dlm-kmp-default |
| ||||||||
| gfs2-kmp-default |
| ||||||||
| kernel-64kb |
| ||||||||
| kernel-azure |
| ||||||||
| kernel-default |
| ||||||||
| kernel-default-base |
| ||||||||
| kernel-docs |
| ||||||||
| kernel-macros |
| ||||||||
| kernel-obs-build |
| ||||||||
| kernel-source |
| ||||||||
| kernel-source-azure |
| ||||||||
| kernel-syms |
| ||||||||
| kernel-syms-azure |
| ||||||||
| kernel-zfcpdump |
| ||||||||
| ocfs2-kmp-default |
| ||||||||
| reiserfs-kmp-default |
|
References