{"id":"CVE-2025-68724","summary":"crypto: asymmetric_keys - prevent overflow in asymmetric_key_generate_id","details":"In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: asymmetric_keys - prevent overflow in asymmetric_key_generate_id\n\nUse check_add_overflow() to guard against potential integer overflows\nwhen adding the binary blob lengths and the size of an asymmetric_key_id\nstructure and return ERR_PTR(-EOVERFLOW) accordingly. This prevents a\npossible buffer overflow when copying data from potentially malicious\nX.509 certificate fields that can be arbitrarily large, such as ASN.1\nINTEGER serial numbers, issuer names, etc.","modified":"2026-03-31T17:29:29.682833Z","published":"2025-12-24T10:33:08.932Z","related":["SUSE-SU-2026:0278-1","SUSE-SU-2026:0281-1","SUSE-SU-2026:0293-1","SUSE-SU-2026:0315-1","SUSE-SU-2026:1078-1","SUSE-SU-2026:20207-1","SUSE-SU-2026:20220-1","SUSE-SU-2026:20228-1","SUSE-SU-2026:20477-1","SUSE-SU-2026:20498-1","SUSE-SU-2026:20845-1","SUSE-SU-2026:20876-1","openSUSE-SU-2026:10039-1","openSUSE-SU-2026:10301-1","openSUSE-SU-2026:20145-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/68xxx/CVE-2025-68724.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/5b8ac617c8dab5cad3c4dc8d84d0987808a0f99c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/60a7be5ee74408147e439164ac067e418ca74bb4"},{"type":"WEB","url":"https://git.kernel.org/stable/c/6af753ac5205115e6c310c8c4236c01b59a1c44f"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b7090a5c153105b9fd221a5a81459ee8cd5babd6"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c13c6e9de91d7f1dd7df756b1fa5a1f968839d76"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c73be4f51eed98fa0c7c189db8f279e1c86bfbf7"},{"type":"WEB","url":"https://git.kernel.org/stable/c/df0845cf447ae1556c3440b8b155de0926cbaa56"},{"type":"WEB","url":"https://git.kernel.org/stable/c/dfc1613961828745165aec6552c3818fa14ab725"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/68xxx/CVE-2025-68724.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-68724"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"7901c1a8effbe5f89673bfc09d6e37b8f334f1a7"},{"fixed":"60a7be5ee74408147e439164ac067e418ca74bb4"},{"fixed":"c13c6e9de91d7f1dd7df756b1fa5a1f968839d76"},{"fixed":"dfc1613961828745165aec6552c3818fa14ab725"},{"fixed":"5b8ac617c8dab5cad3c4dc8d84d0987808a0f99c"},{"fixed":"c73be4f51eed98fa0c7c189db8f279e1c86bfbf7"},{"fixed":"6af753ac5205115e6c310c8c4236c01b59a1c44f"},{"fixed":"b7090a5c153105b9fd221a5a81459ee8cd5babd6"},{"fixed":"df0845cf447ae1556c3440b8b155de0926cbaa56"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-68724.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"3.18.0"},{"fixed":"5.10.248"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.198"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.160"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.6.120"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.7.0"},{"fixed":"6.12.63"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.13.0"},{"fixed":"6.17.13"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.18.0"},{"fixed":"6.18.2"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-68724.json"}}],"schema_version":"1.7.5"}