{"id":"CVE-2025-68816","summary":"net/mlx5: fw_tracer, Validate format string parameters","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5: fw_tracer, Validate format string parameters\n\nAdd validation for format string parameters in the firmware tracer to\nprevent potential security vulnerabilities and crashes from malformed\nformat strings received from firmware.\n\nThe firmware tracer receives format strings from the device firmware and\nuses them to format trace messages. Without proper validation, bad\nfirmware could provide format strings with invalid format specifiers\n(e.g., %s, %p, %n) that could lead to crashes, or other undefined\nbehavior.\n\nAdd mlx5_tracer_validate_params() to validate that all format specifiers\nin trace strings are limited to safe integer/hex formats (%x, %d, %i,\n%u, %llx, %lx, etc.). Reject strings containing other format types that\ncould be used to access arbitrary memory or cause crashes.\nInvalid format strings are added to the trace output for visibility with\n\"BAD_FORMAT: \" prefix.","modified":"2026-03-31T17:29:44.269457Z","published":"2026-01-13T15:29:20.464Z","related":["MGASA-2026-0017","MGASA-2026-0018","SUSE-SU-2026:0447-1","SUSE-SU-2026:0472-1","SUSE-SU-2026:0473-1","SUSE-SU-2026:0587-1","SUSE-SU-2026:20477-1","SUSE-SU-2026:20498-1","SUSE-SU-2026:20555-1","SUSE-SU-2026:20599-1","SUSE-SU-2026:20615-1","SUSE-SU-2026:20845-1","SUSE-SU-2026:20876-1","openSUSE-SU-2026:20287-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/68xxx/CVE-2025-68816.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/38ac688b52ef26a88f8bc4fe26d24fdd0ff91e5d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/45bd283b1d69e2c97cddcb9956f0e0261fc4efd7"},{"type":"WEB","url":"https://git.kernel.org/stable/c/768d559f466cdd72849110a7ecd76a21d52dcfe3"},{"type":"WEB","url":"https://git.kernel.org/stable/c/8ac688c0e430dab19f6a9b70df94b1f635612c1a"},{"type":"WEB","url":"https://git.kernel.org/stable/c/8c35c2448086870509ede43947845be0833251f0"},{"type":"WEB","url":"https://git.kernel.org/stable/c/95624b731c490a4b849844269193a233d6d556a0"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b35966042d20b14e2d83330049f77deec5229749"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/68xxx/CVE-2025-68816.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-68816"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"70dd6fdb8987b14f7b6105f6be0617299e459398"},{"fixed":"95624b731c490a4b849844269193a233d6d556a0"},{"fixed":"768d559f466cdd72849110a7ecd76a21d52dcfe3"},{"fixed":"38ac688b52ef26a88f8bc4fe26d24fdd0ff91e5d"},{"fixed":"8ac688c0e430dab19f6a9b70df94b1f635612c1a"},{"fixed":"45bd283b1d69e2c97cddcb9956f0e0261fc4efd7"},{"fixed":"8c35c2448086870509ede43947845be0833251f0"},{"fixed":"b35966042d20b14e2d83330049f77deec5229749"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-68816.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"4.19.0"},{"fixed":"5.10.248"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.198"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.160"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.6.120"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.7.0"},{"fixed":"6.12.64"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.13.0"},{"fixed":"6.18.3"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-68816.json"}}],"schema_version":"1.7.5"}