Import Source
https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-72520.json
JSON Data
https://api.test.osv.dev/v1/vulns/AZL-72520
Upstream
Published
2025-12-16T14:15:58Z
Modified
2026-04-01T05:22:34.276384Z
Summary
CVE-2025-68237 affecting package kernel for versions less than 6.6.119.3-1
Details

In the Linux kernel, the following vulnerability has been resolved:

mtdchar: fix integer overflow in read/write ioctls

The "req.start" and "req.len" variables are u64 values that come from the user at the start of the function. We mask away the high 32 bits of "req.len" so that's capped at U32MAX but the "req.start" variable can go up to U64MAX which means that the addition can still integer overflow.

Use checkaddoverflow() to fix this bug.

References

Affected packages

Azure Linux:3 / kernel

Package

Name
kernel
Purl
pkg:rpm/azure-linux/kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.6.119.3-1

Database specific

source
"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-72520.json"