First published: Tue Apr 01 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: net/mlx5: handle errors in mlx5_chains_create_table() In mlx5_chains_create_table(), the return value of mlx5_get_fdb_sub_ns() and mlx5_get_flow_namespace() must be checked to prevent NULL pointer dereferences. If either function fails, the function should log error message with mlx5_core_warn() and return error pointer.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-21975 is classified as a medium severity vulnerability due to the potential for NULL pointer dereferences in the Linux kernel.
To fix CVE-2025-21975, update your Linux kernel to a version where this vulnerability has been resolved.
The potential impact of CVE-2025-21975 includes system instability or crashes due to NULL pointer dereferences.
CVE-2025-21975 affects multiple versions of the Linux kernel that include the flawed mlx5_chains_create_table() function.
Yes, CVE-2025-21975 is related to network security as it involves flow management functions within the Linux kernel.