CVE-2025-68217
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
16/12/2025
Última modificación:
16/12/2025
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
Input: pegasus-notetaker - fix potential out-of-bounds access<br />
<br />
In the pegasus_notetaker driver, the pegasus_probe() function allocates<br />
the URB transfer buffer using the wMaxPacketSize value from<br />
the endpoint descriptor. An attacker can use a malicious USB descriptor<br />
to force the allocation of a very small buffer.<br />
<br />
Subsequently, if the device sends an interrupt packet with a specific<br />
pattern (e.g., where the first byte is 0x80 or 0x42),<br />
the pegasus_parse_packet() function parses the packet without checking<br />
the allocated buffer size. This leads to an out-of-bounds memory access.
Impacto
Referencias a soluciones, herramientas e información
- https://git.kernel.org/stable/c/015b719962696b793997e8deefac019f816aca77
- https://git.kernel.org/stable/c/084264e10e2ae8938a54355123ad977eb9df56d6
- https://git.kernel.org/stable/c/36bc92b838ff72f62f2c17751a9013b29ead2513
- https://git.kernel.org/stable/c/69aeb507312306f73495598a055293fa749d454e
- https://git.kernel.org/stable/c/763c3f4d2394a697d14af1335d3bb42f05c9409f
- https://git.kernel.org/stable/c/9ab67eff6d654e34ba6da07c64761aa87c2a3c26
- https://git.kernel.org/stable/c/c4e746651bd74c38f581e1cf31651119a94de8cd
- https://git.kernel.org/stable/c/d344ea1baf1946c90f0cd6f9daeb5f3e0a0ca479



