CVE-2025-68237
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
16/12/2025
Última modificación:
16/12/2025
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
mtdchar: fix integer overflow in read/write ioctls<br />
<br />
The "req.start" and "req.len" variables are u64 values that come from the<br />
user at the start of the function. We mask away the high 32 bits of<br />
"req.len" so that&#39;s capped at U32_MAX but the "req.start" variable can go<br />
up to U64_MAX which means that the addition can still integer overflow.<br />
<br />
Use check_add_overflow() to fix this bug.
Impacto
Referencias a soluciones, herramientas e información
- https://git.kernel.org/stable/c/37944f4f8199cd153fef74e95ca268020162f212
- https://git.kernel.org/stable/c/457376c6fbf0c69326a9bf1f72416225f681192b
- https://git.kernel.org/stable/c/e4185bed738da755b191aa3f2e16e8b48450e1b8
- https://git.kernel.org/stable/c/eb9361484814fb12f3b7544b33835ea67d7a6a97
- https://git.kernel.org/stable/c/f37efdd97fd1ec3e0d0f1eec279c8279e28f981e



