CVE-2025-68792 — Use of Out-of-range Pointer Offset in Linux
Severity
6.4MEDIUM
No vectorEPSS
0.0%
top 91.31%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJan 13
Latest updateApr 17
Description
In the Linux kernel, the following vulnerability has been resolved:
tpm2-sessions: Fix out of range indexing in name_size
'name_size' does not have any range checks, and it just directly indexes
with TPM_ALG_ID, which could lead into memory corruption at worst.
Address the issue by only processing known values and returning -EINVAL for
unrecognized values.
Make also 'tpm_buf_append_name' and 'tpm_buf_fill_hmac_session' fallible so
that errors are detected before causing any spurious TPM traf…
Affected Packages7 packages
▶CVEListV5linux/linux1085b8276bb4239daa7008f0dcd5c973e4bd690f — 47e676ce4d68f461dfcab906f6aeb254f7276deb+3
🔴Vulnerability Details
3OSV▶
CVE-2025-68792: In the Linux kernel, the following vulnerability has been resolved: tpm2-sessions: Fix out of range indexing in name_size 'name_size' does not have an↗2026-01-13
GHSA▶
GHSA-2wfq-pvgx-w5wx: In the Linux kernel, the following vulnerability has been resolved:
tpm2-sessions: Fix out of range indexing in name_size
'name_size' does not have↗2026-01-13
📋Vendor Advisories
5Debian▶
CVE-2025-68792: linux - In the Linux kernel, the following vulnerability has been resolved: tpm2-sessio...↗2025