{"id":"CVE-2025-68217","summary":"Input: pegasus-notetaker - fix potential out-of-bounds access","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nInput: pegasus-notetaker - fix potential out-of-bounds access\n\nIn the pegasus_notetaker driver, the pegasus_probe() function allocates\nthe URB transfer buffer using the wMaxPacketSize value from\nthe endpoint descriptor. An attacker can use a malicious USB descriptor\nto force the allocation of a very small buffer.\n\nSubsequently, if the device sends an interrupt packet with a specific\npattern (e.g., where the first byte is 0x80 or 0x42),\nthe pegasus_parse_packet() function parses the packet without checking\nthe allocated buffer size. This leads to an out-of-bounds memory access.","modified":"2026-05-15T04:14:11.652102241Z","published":"2025-12-16T13:57:12.011Z","related":["SUSE-SU-2026:0278-1","SUSE-SU-2026:0281-1","SUSE-SU-2026:0293-1","SUSE-SU-2026:0315-1","SUSE-SU-2026:20207-1","SUSE-SU-2026:20220-1","SUSE-SU-2026:20228-1","SUSE-SU-2026:20477-1","SUSE-SU-2026:20498-1","SUSE-SU-2026:20845-1","SUSE-SU-2026:20876-1","openSUSE-SU-2026:20145-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/68xxx/CVE-2025-68217.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/015b719962696b793997e8deefac019f816aca77"},{"type":"WEB","url":"https://git.kernel.org/stable/c/084264e10e2ae8938a54355123ad977eb9df56d6"},{"type":"WEB","url":"https://git.kernel.org/stable/c/36bc92b838ff72f62f2c17751a9013b29ead2513"},{"type":"WEB","url":"https://git.kernel.org/stable/c/69aeb507312306f73495598a055293fa749d454e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/763c3f4d2394a697d14af1335d3bb42f05c9409f"},{"type":"WEB","url":"https://git.kernel.org/stable/c/9ab67eff6d654e34ba6da07c64761aa87c2a3c26"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c4e746651bd74c38f581e1cf31651119a94de8cd"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d344ea1baf1946c90f0cd6f9daeb5f3e0a0ca479"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/68xxx/CVE-2025-68217.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-68217"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"4.8.0"},{"fixed":"5.4.302"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.5.0"},{"fixed":"5.10.247"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.197"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.159"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.6.118"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.7.0"},{"fixed":"6.12.60"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.13.0"},{"fixed":"6.17.10"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-68217.json"}}],"schema_version":"1.7.5"}