First published: Tue Apr 01 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: limit printed string from FW file There's no guarantee here that the file is always with a NUL-termination, so reading the string may read beyond the end of the TLV. If that's the last TLV in the file, it can perhaps even read beyond the end of the file buffer. Fix that by limiting the print format to the size of the buffer we have.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | ||
Linux Kernel | >=5.2<5.4.291 | |
Linux Kernel | >=5.5<5.10.235 | |
Linux Kernel | >=5.11<5.15.179 | |
Linux Kernel | >=5.16<6.1.131 | |
Linux Kernel | >=6.2<6.6.83 | |
Linux Kernel | >=6.7<6.12.19 | |
Linux Kernel | >=6.13<6.13.7 | |
Linux Kernel | =6.14-rc1 | |
Linux Kernel | =6.14-rc2 | |
Linux Kernel | =6.14-rc3 | |
Linux Kernel | =6.14-rc4 | |
Linux Kernel | =6.14-rc5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-21905 has been classified as a moderate severity vulnerability in the Linux kernel.
To fix CVE-2025-21905, update the Linux kernel to a version that has addressed this vulnerability, specifically versions beyond those listed affected.
CVE-2025-21905 affects multiple versions of the Linux kernel, specifically those between 5.2 and 6.14-rc5.
CVE-2025-21905 is a vulnerability related to improper string termination in the iwlwifi driver, which may lead to reading beyond buffer boundaries.
While the recommended method to mitigate CVE-2025-21905 is to update the kernel, no specific workarounds have been documented.