CVE-2025-21711

In the Linux kernel, the following vulnerability has been resolved: net/rose: prevent integer overflows in rose_setsockopt() In case of possible unpredictably large arguments passed to rose_setsockopt() and multiplied by extra values on top of that, integer overflows may occur. Do the safest minimum and fix these issues by checking the contents of 'opt' and returning -EINVAL if they are too large. Also, switch to unsigned int and remove useless check for negative 'opt' in ROSE_IDLE case.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

13 Mar 2025, 13:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/4bdd449977e2364a53d0b2a5427e71beb1cd702d -
  • () https://git.kernel.org/stable/c/b8583b54455cbec2fc038fa32b6700890b369815 -

07 Mar 2025, 12:30

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/352daa50946c3bbb662432e8daf54d6760796589 - () https://git.kernel.org/stable/c/352daa50946c3bbb662432e8daf54d6760796589 - Patch
References () https://git.kernel.org/stable/c/9bdee49ad6bbd26ab5e13cc6731e54fb1b6c1dca - () https://git.kernel.org/stable/c/9bdee49ad6bbd26ab5e13cc6731e54fb1b6c1dca - Patch
References () https://git.kernel.org/stable/c/d08f4074f9c69f7e95502587eb1b258a965ba7f0 - () https://git.kernel.org/stable/c/d08f4074f9c69f7e95502587eb1b258a965ba7f0 - Patch
References () https://git.kernel.org/stable/c/d640627663bfe7d8963c7615316d7d4ef60f3b0b - () https://git.kernel.org/stable/c/d640627663bfe7d8963c7615316d7d4ef60f3b0b - Patch
References () https://git.kernel.org/stable/c/e5338930a29d0ab2a5af402f5f664aeba0d1a676 - () https://git.kernel.org/stable/c/e5338930a29d0ab2a5af402f5f664aeba0d1a676 - Patch
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net/rose: evitar desbordamientos de números enteros en rose_setsockopt() En caso de que se pasen argumentos impredeciblemente grandes a rose_setsockopt() y se multipliquen por valores adicionales además de eso, pueden ocurrir desbordamientos de números enteros. Haga lo mínimo más seguro y solucione estos problemas comprobando el contenido de 'opt' y devolviendo -EINVAL si es demasiado grande. Además, cambie a int sin signo y elimine la comprobación inútil para 'opt' negativo en el caso de ROSE_IDLE.
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE CWE-190
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux linux Kernel
Linux

27 Feb 2025, 02:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-27 02:15

Updated : 2025-03-13 13:15


NVD link : CVE-2025-21711

Mitre link : CVE-2025-21711

CVE.ORG link : CVE-2025-21711


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-190

Integer Overflow or Wraparound