๐Ÿ” CVE Alert

CVE-2025-68237

UNKNOWN 0.0

mtdchar: fix integer overflow in read/write ioctls

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: mtdchar: fix integer overflow in read/write ioctls The "req.start" and "req.len" variables are u64 values that come from the user at the start of the function. We mask away the high 32 bits of "req.len" so that's capped at U32_MAX but the "req.start" variable can go up to U64_MAX which means that the addition can still integer overflow. Use check_add_overflow() to fix this bug.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Dec 16, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
6420ac0af95dbcb2fd8452e2d551ab50e1bbad83 < f37efdd97fd1ec3e0d0f1eec279c8279e28f981e 6420ac0af95dbcb2fd8452e2d551ab50e1bbad83 < 457376c6fbf0c69326a9bf1f72416225f681192b 6420ac0af95dbcb2fd8452e2d551ab50e1bbad83 < eb9361484814fb12f3b7544b33835ea67d7a6a97 6420ac0af95dbcb2fd8452e2d551ab50e1bbad83 < 37944f4f8199cd153fef74e95ca268020162f212 6420ac0af95dbcb2fd8452e2d551ab50e1bbad83 < e4185bed738da755b191aa3f2e16e8b48450e1b8
Linux / Linux
5.17

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/f37efdd97fd1ec3e0d0f1eec279c8279e28f981e git.kernel.org: https://git.kernel.org/stable/c/457376c6fbf0c69326a9bf1f72416225f681192b git.kernel.org: https://git.kernel.org/stable/c/eb9361484814fb12f3b7544b33835ea67d7a6a97 git.kernel.org: https://git.kernel.org/stable/c/37944f4f8199cd153fef74e95ca268020162f212 git.kernel.org: https://git.kernel.org/stable/c/e4185bed738da755b191aa3f2e16e8b48450e1b8