In the Linux kernel, the following vulnerability has been resolved:
xsk: fix an integer overflow in xp_create_and_assign_umem()
Since the i and pool->chunk_size variables are of type 'u32',
their product can wrap around and then be cast to 'u64'.
This can lead to two different XDP buffers pointing to the same
memory area.
Found by InfoTeCS on behalf of Linux Verification Center
(linuxtesting.org) with SVACE.
References
Configurations
Configuration 1 (hide)
|
History
10 Apr 2025, 16:16
Type | Values Removed | Values Added |
---|---|---|
First Time |
Linux linux Kernel
Linux |
|
CWE | CWE-190 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
CPE | cpe:2.3:o:linux:linux_kernel:6.14:rc6:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.14:rc7:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.14:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.14:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.14:rc3:*:*:*:*:*:* |
|
References | () https://git.kernel.org/stable/c/130290f44bce0eead2b827302109afc3fe189ddd - Patch | |
References | () https://git.kernel.org/stable/c/205649d642a5b376724f04f3a5b3586815e43d3b - Patch | |
References | () https://git.kernel.org/stable/c/559847f56769037e5b2e0474d3dbff985b98083d - Patch | |
References | () https://git.kernel.org/stable/c/b7b4be1fa43294b50b22e812715198629806678a - Patch | |
References | () https://git.kernel.org/stable/c/c7670c197b0f1a8726ad5c87bc2bf001a1fc1bbd - Patch |
07 Apr 2025, 14:18
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
03 Apr 2025, 08:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-04-03 08:15
Updated : 2025-04-10 16:16
NVD link : CVE-2025-21997
Mitre link : CVE-2025-21997
CVE.ORG link : CVE-2025-21997
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-190
Integer Overflow or Wraparound