HomeDefectsLIN1023-17885
Fixed

LIN1023-17885 : Security Advisory - linux - CVE-2025-68750

Created: Dec 25, 2025    Updated: Dec 27, 2025
Resolved Date: Dec 25, 2025
Found In Version: 10.23.30.2
Fix Version: 10.23.30.18
Severity: Standard
Applicable for: Wind River Linux LTS 23
Component/s: Kernel

Description

In the Linux kernel, the following vulnerability has been resolved:

usb: potential integer overflow in usbg_make_tpg()

The variable tpgt in usbg_make_tpg() is defined as unsigned long and is
assigned to tpgt->tport_tpgt, which is defined as u16. This may cause an
integer overflow when tpgt is greater than USHRT_MAX (65535). I
haven't tried to trigger it myself, but it is possible to trigger it
by calling usbg_make_tpg() with a large value for tpgt.

I modified the type of tpgt to match tpgt->tport_tpgt and adjusted the
relevant code accordingly.

This patch is similar to commit 59c816c1f24d ("vhost/scsi: potential
memory corruption").

CVEs


Live chat
Online