Home

Description

In the Linux kernel, the following vulnerability has been resolved: usb: potential integer overflow in usbg_make_tpg() The variable tpgt in usbg_make_tpg() is defined as unsigned long and is assigned to tpgt->tport_tpgt, which is defined as u16. This may cause an integer overflow when tpgt is greater than USHRT_MAX (65535). I haven't tried to trigger it myself, but it is possible to trigger it by calling usbg_make_tpg() with a large value for tpgt. I modified the type of tpgt to match tpgt->tport_tpgt and adjusted the relevant code accordingly. This patch is similar to commit 59c816c1f24d ("vhost/scsi: potential memory corruption").

PUBLISHED Reserved 2025-12-24 | Published 2025-12-24 | Updated 2025-12-24 | Assigner Linux

Product status

Default status
unaffected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 0861b9cb2ff519b7c5a3b1dd52a343e18c4efb24
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 603a83e5fee38a950bfcfb2f36449311fa00a474
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 6f77e344515b5258edb3988188311464209b1c7c
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 6722e080b5b39ab7471386c73d0c1b39572f943c
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before a33f507f36d5881f602dab581ab0f8d22b49762c
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 358d5ba08f1609c34a054aed88c431844d09705a
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 620a5e1e84a3a7004270703a118d33eeb1c0f368
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 153874010354d050f62f8ae25cbb960c17633dc5
affected

Default status
affected

5.4.296 (semver)
unaffected

5.10.240 (semver)
unaffected

5.15.187 (semver)
unaffected

6.1.143 (semver)
unaffected

6.6.96 (semver)
unaffected

6.12.36 (semver)
unaffected

6.15.5 (semver)
unaffected

6.16 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/0861b9cb2ff519b7c5a3b1dd52a343e18c4efb24

git.kernel.org/...c/603a83e5fee38a950bfcfb2f36449311fa00a474

git.kernel.org/...c/6f77e344515b5258edb3988188311464209b1c7c

git.kernel.org/...c/6722e080b5b39ab7471386c73d0c1b39572f943c

git.kernel.org/...c/a33f507f36d5881f602dab581ab0f8d22b49762c

git.kernel.org/...c/358d5ba08f1609c34a054aed88c431844d09705a

git.kernel.org/...c/620a5e1e84a3a7004270703a118d33eeb1c0f368

git.kernel.org/...c/153874010354d050f62f8ae25cbb960c17633dc5

cve.org (CVE-2025-68750)

nvd.nist.gov (CVE-2025-68750)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.