In the Linux kernel, the following vulnerability has been resolved:
crypto: asymmetrickeys - prevent overflow in asymmetrickeygenerateid
Use checkaddoverflow() to guard against potential integer overflows when adding the binary blob lengths and the size of an asymmetrickeyid structure and return ERR_PTR(-EOVERFLOW) accordingly. This prevents a possible buffer overflow when copying data from potentially malicious X.509 certificate fields that can be arbitrarily large, such as ASN.1 INTEGER serial numbers, issuer names, etc.
{
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/68xxx/CVE-2025-68724.json",
"cna_assigner": "Linux"
}