Description

In the Linux kernel, the following vulnerability has been resolved: usb: potential integer overflow in usbg_make_tpg() The variable tpgt in usbg_make_tpg() is defined as unsigned long and is assigned to tpgt->tport_tpgt, which is defined as u16. This may cause an integer overflow when tpgt is greater than USHRT_MAX (65535). I haven't tried to trigger it myself, but it is possible to trigger it by calling usbg_make_tpg() with a large value for tpgt. I modified the type of tpgt to match tpgt->tport_tpgt and adjusted the relevant code accordingly. This patch is similar to commit 59c816c1f24d ("vhost/scsi: potential memory corruption").

INFO

Published Date :

2025-12-24T15:51:03.141Z

Last Modified :

2026-01-02T15:35:14.366Z

Source :

Linux
AFFECTED PRODUCTS

The following products are affected by CVE-2025-68750 vulnerability.

Vendors Products
Linux
  • Linux Kernel

CVSS Vulnerability Scoring System