First published: Thu Feb 27 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: net/rose: prevent integer overflows in rose_setsockopt() In case of possible unpredictably large arguments passed to rose_setsockopt() and multiplied by extra values on top of that, integer overflows may occur. Do the safest minimum and fix these issues by checking the contents of 'opt' and returning -EINVAL if they are too large. Also, switch to unsigned int and remove useless check for negative 'opt' in ROSE_IDLE case.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | ||
Linux Kernel | >=2.6.12<6.1.129 | |
Linux Kernel | >=6.2<6.6.76 | |
Linux Kernel | >=6.7<6.12.13 | |
Linux Kernel | >=6.13<6.13.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-21711 has a moderate severity level due to potential integer overflows in the Linux kernel's rose_setsockopt() function.
To fix CVE-2025-21711, users should update their Linux kernel to the latest available version that includes the security patch.
Exploiting CVE-2025-21711 can lead to system instability or crashes due to integer overflow vulnerabilities.
CVE-2025-21711 affects multiple versions of the Linux kernel, specifically from 2.6.12 to 6.1.129, 6.2 to 6.6.76, 6.7 to 6.12.13, and 6.13 to 6.13.2.
The CVE-2025-21711 vulnerability specifically impacts the net/rose component of the Linux kernel.