{"id":"CVE-2025-68799","summary":"caif: fix integer underflow in cffrml_receive()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\ncaif: fix integer underflow in cffrml_receive()\n\nThe cffrml_receive() function extracts a length field from the packet\nheader and, when FCS is disabled, subtracts 2 from this length without\nvalidating that len \u003e= 2.\n\nIf an attacker sends a malicious packet with a length field of 0 or 1\nto an interface with FCS disabled, the subtraction causes an integer\nunderflow.\n\nThis can lead to memory exhaustion and kernel instability, potential\ninformation disclosure if padding contains uninitialized kernel memory.\n\nFix this by validating that len \u003e= 2 before performing the subtraction.","modified":"2026-04-02T13:03:50.324034Z","published":"2026-01-13T15:29:09.012Z","related":["MGASA-2026-0017","MGASA-2026-0018","SUSE-SU-2026:20555-1","SUSE-SU-2026:20599-1","SUSE-SU-2026:20615-1","openSUSE-SU-2026:20287-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/68xxx/CVE-2025-68799.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/21fdcc00656a60af3c7aae2dea8dd96abd35519c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/4ec29714aa4e0601ea29d2f02b461fc0ac92c2c3"},{"type":"WEB","url":"https://git.kernel.org/stable/c/785c7be6361630070790f6235b696da156ac71b3"},{"type":"WEB","url":"https://git.kernel.org/stable/c/8a11ff0948b5ad09b71896b7ccc850625f9878d1"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c54091eec6fed19e94182aa05dd6846600a642f7"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f407f1c9f45bbf5c99fd80b3f3f4a94fdbe35691"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f818cd472565f8b0c2c409b040e0121c5cf8592c"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/68xxx/CVE-2025-68799.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-68799"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"b482cd2053e3b90a7b33a78c63cdb6badf2ec383"},{"fixed":"f407f1c9f45bbf5c99fd80b3f3f4a94fdbe35691"},{"fixed":"c54091eec6fed19e94182aa05dd6846600a642f7"},{"fixed":"785c7be6361630070790f6235b696da156ac71b3"},{"fixed":"f818cd472565f8b0c2c409b040e0121c5cf8592c"},{"fixed":"4ec29714aa4e0601ea29d2f02b461fc0ac92c2c3"},{"fixed":"21fdcc00656a60af3c7aae2dea8dd96abd35519c"},{"fixed":"8a11ff0948b5ad09b71896b7ccc850625f9878d1"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-68799.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"2.6.35"},{"fixed":"5.10.248"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.198"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.160"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.6.120"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.7.0"},{"fixed":"6.12.64"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.13.0"},{"fixed":"6.18.3"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-68799.json"}}],"schema_version":"1.7.5"}