CVE-2025-68342
Unknown Unknown - Not Provided
Buffer Overflow in Linux gs_usb Driver Due to Insufficient Length Check

Publication date: 2025-12-23

Last updated on: 2025-12-23

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: can: gs_usb: gs_usb_receive_bulk_callback(): check actual_length before accessing data The URB received in gs_usb_receive_bulk_callback() contains a struct gs_host_frame. The length of the data after the header depends on the gs_host_frame hf::flags and the active device features (e.g. time stamping). Introduce a new function gs_usb_get_minimum_length() and check that we have at least received the required amount of data before accessing it. Only copy the data to that skb that has actually been received. [mkl: rename gs_usb_get_minimum_length() -> +gs_usb_get_minimum_rx_length()]
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-23
Last Modified
2025-12-23
Generated
2026-05-07
AI Q&A
2025-12-23
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
linux linux_kernel *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in the Linux kernel's gs_usb driver involves improper checking of the actual_length field in the gs_usb_receive_bulk_callback() function before accessing data. The function receives a USB Request Block (URB) containing a gs_host_frame structure, where the length of data after the header depends on certain flags and device features. The fix introduces a new function to ensure that the minimum required length of data has been received before accessing it, preventing potential out-of-bounds access or data corruption.


How can this vulnerability impact me? :

If exploited, this vulnerability could lead to the Linux kernel accessing data beyond the actual received length, potentially causing memory corruption, system instability, or crashes. This could affect system reliability and security, possibly allowing an attacker to cause denial of service or execute arbitrary code depending on the context.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart