CVE-2025-21905

In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: limit printed string from FW file There's no guarantee here that the file is always with a NUL-termination, so reading the string may read beyond the end of the TLV. If that's the last TLV in the file, it can perhaps even read beyond the end of the file buffer. Fix that by limiting the print format to the size of the buffer we have.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc5:*:*:*:*:*:*

History

15 Apr 2025, 16:59

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/38f0d398b6d7640d223db69df022c4a232f24774 - () https://git.kernel.org/stable/c/38f0d398b6d7640d223db69df022c4a232f24774 - Patch
References () https://git.kernel.org/stable/c/47616b82f2d42ea2060334746fed9a2988d845c9 - () https://git.kernel.org/stable/c/47616b82f2d42ea2060334746fed9a2988d845c9 - Patch
References () https://git.kernel.org/stable/c/59cdda202829d1d6a095d233386870a59aff986f - () https://git.kernel.org/stable/c/59cdda202829d1d6a095d233386870a59aff986f - Patch
References () https://git.kernel.org/stable/c/88ed69f924638c7503644e1f8eed1e976f3ffa7a - () https://git.kernel.org/stable/c/88ed69f924638c7503644e1f8eed1e976f3ffa7a - Patch
References () https://git.kernel.org/stable/c/b02f8d5a71c8571ccf77f285737c566db73ef5e5 - () https://git.kernel.org/stable/c/b02f8d5a71c8571ccf77f285737c566db73ef5e5 - Patch
References () https://git.kernel.org/stable/c/c0e626f2b2390472afac52dfe72b29daf9ed8e1d - () https://git.kernel.org/stable/c/c0e626f2b2390472afac52dfe72b29daf9ed8e1d - Patch
References () https://git.kernel.org/stable/c/e0dc2c1bef722cbf16ae557690861e5f91208129 - () https://git.kernel.org/stable/c/e0dc2c1bef722cbf16ae557690861e5f91208129 - Patch
References () https://git.kernel.org/stable/c/f265e6031d0bc4fc40c4619cb42466722b46eaa9 - () https://git.kernel.org/stable/c/f265e6031d0bc4fc40c4619cb42466722b46eaa9 - Patch
First Time Linux linux Kernel
Linux
CWE CWE-125
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.1
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: iwlwifi: limitar la cadena impresa del archivo FW. No se garantiza que el archivo siempre tenga una terminación NUL, por lo que al leer la cadena, se podría leer más allá del final del TLV. Si ese es el último TLV del archivo, es posible que incluso pueda leer más allá del final del búfer del archivo. Para solucionar esto, limite el formato de impresión al tamaño del búfer disponible.
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc4:*:*:*:*:*:*

01 Apr 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-04-01 16:15

Updated : 2025-04-15 16:59


NVD link : CVE-2025-21905

Mitre link : CVE-2025-21905

CVE.ORG link : CVE-2025-21905


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-125

Out-of-bounds Read