{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T14:15:33.815","vulnerabilities":[{"cve":{"id":"CVE-2025-68816","sourceIdentifier":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","published":"2026-01-13T16:16:03.870","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5: fw_tracer, Validate format string parameters\n\nAdd validation for format string parameters in the firmware tracer to\nprevent potential security vulnerabilities and crashes from malformed\nformat strings received from firmware.\n\nThe firmware tracer receives format strings from the device firmware and\nuses them to format trace messages. Without proper validation, bad\nfirmware could provide format strings with invalid format specifiers\n(e.g., %s, %p, %n) that could lead to crashes, or other undefined\nbehavior.\n\nAdd mlx5_tracer_validate_params() to validate that all format specifiers\nin trace strings are limited to safe integer/hex formats (%x, %d, %i,\n%u, %llx, %lx, etc.). Reject strings containing other format types that\ncould be used to access arbitrary memory or cause crashes.\nInvalid format strings are added to the trace output for visibility with\n\"BAD_FORMAT: \" prefix."},{"lang":"es","value":"En el kernel de Linux, la siguiente vulnerabilidad ha sido resuelta:\n\nnet/mlx5: fw_tracer, Validar parámetros de cadena de formato\n\nAñadir validación para los parámetros de cadena de formato en el trazador de firmware para prevenir posibles vulnerabilidades de seguridad y fallos causados por cadenas de formato malformadas recibidas del firmware.\n\nEl trazador de firmware recibe cadenas de formato del firmware del dispositivo y las utiliza para formatear mensajes de traza. Sin una validación adecuada, un firmware defectuoso podría proporcionar cadenas de formato con especificadores de formato inválidos (p. ej., %s, %p, %n) que podrían provocar fallos u otro comportamiento indefinido.\n\nAñadir mlx5_tracer_validate_params() para validar que todos los especificadores de formato en las cadenas de traza estén limitados a formatos seguros de entero/hexadecimal (p. ej., %x, %d, %i, %u, %llx, %lx, etc.). Rechazar cadenas que contengan otros tipos de formato que podrían utilizarse para acceder a memoria arbitraria o causar fallos.\nLas cadenas de formato inválidas se añaden a la salida de traza para visibilidad con el prefijo 'BAD_FORMAT: '."}],"metrics":{},"references":[{"url":"https://git.kernel.org/stable/c/38ac688b52ef26a88f8bc4fe26d24fdd0ff91e5d","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/45bd283b1d69e2c97cddcb9956f0e0261fc4efd7","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/768d559f466cdd72849110a7ecd76a21d52dcfe3","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/8ac688c0e430dab19f6a9b70df94b1f635612c1a","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/8c35c2448086870509ede43947845be0833251f0","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/95624b731c490a4b849844269193a233d6d556a0","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/b35966042d20b14e2d83330049f77deec5229749","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"}]}}]}