CVE-2025-21993

In the Linux kernel, the following vulnerability has been resolved: iscsi_ibft: Fix UBSAN shift-out-of-bounds warning in ibft_attr_show_nic() When performing an iSCSI boot using IPv6, iscsistart still reads the /sys/firmware/ibft/ethernetX/subnet-mask entry. Since the IPv6 prefix length is 64, this causes the shift exponent to become negative, triggering a UBSAN warning. As the concept of a subnet mask does not apply to IPv6, the value is set to ~0 to suppress the warning message.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*

History

10 Apr 2025, 13:24

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: iscsi_ibft: Se corrige la advertencia de desplazamiento fuera de los límites de UBSAN en ibft_attr_show_nic(). Al realizar un arranque iSCSI con IPv6, iscsistart sigue leyendo la entrada /sys/firmware/ibft/ethernetX/subnet-mask. Dado que la longitud del prefijo IPv6 es 64, esto hace que el exponente de desplazamiento sea negativo, lo que activa una advertencia de UBSAN. Dado que el concepto de máscara de subred no se aplica a IPv6, el valor se establece en ~0 para suprimir el mensaje de advertencia.
CWE CWE-125
References
  • () https://git.kernel.org/stable/c/a858cd58dea06cf85b142673deea8c5d87f11e70 - Patch
  • () https://git.kernel.org/stable/c/b388e185bfad32bfed6a97a6817f74ca00a4318f - Patch
  • () https://git.kernel.org/stable/c/f763c82db8166e28f45b7cc4a5398a7859665940 - Patch
References () https://git.kernel.org/stable/c/07e0d99a2f701123ad3104c0f1a1e66bce74d6e5 - () https://git.kernel.org/stable/c/07e0d99a2f701123ad3104c0f1a1e66bce74d6e5 - Patch
References () https://git.kernel.org/stable/c/2d1eef248107bdf3d5a69d0fde04c30a79a7bf5d - () https://git.kernel.org/stable/c/2d1eef248107bdf3d5a69d0fde04c30a79a7bf5d - Patch
References () https://git.kernel.org/stable/c/9bfa80c8aa4e06dff55a953c3fffbfc68a3a3b1c - () https://git.kernel.org/stable/c/9bfa80c8aa4e06dff55a953c3fffbfc68a3a3b1c - Patch
References () https://git.kernel.org/stable/c/b253660fac5e0e9080d2c95e3a029e1898d49afb - () https://git.kernel.org/stable/c/b253660fac5e0e9080d2c95e3a029e1898d49afb - Patch
References () https://git.kernel.org/stable/c/c1c6e527470e5eab0b2d57bd073530fbace39eab - () https://git.kernel.org/stable/c/c1c6e527470e5eab0b2d57bd073530fbace39eab - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.1
CPE cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux linux Kernel
Linux

02 Apr 2025, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-04-02 13:15

Updated : 2025-04-10 13:24


NVD link : CVE-2025-21993

Mitre link : CVE-2025-21993

CVE.ORG link : CVE-2025-21993


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-125

Out-of-bounds Read