First published: Thu Apr 03 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: xsk: fix an integer overflow in xp_create_and_assign_umem() Since the i and pool->chunk_size variables are of type 'u32', their product can wrap around and then be cast to 'u64'. This can lead to two different XDP buffers pointing to the same memory area. Found by InfoTeCS on behalf of Linux Verification Center (linuxtesting.org) with SVACE.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | ||
Linux Kernel | >=5.16<6.1.132 | |
Linux Kernel | >=6.2<6.6.85 | |
Linux Kernel | >=6.7<6.12.21 | |
Linux Kernel | >=6.13<6.13.9 | |
Linux Kernel | =6.14-rc1 | |
Linux Kernel | =6.14-rc2 | |
Linux Kernel | =6.14-rc3 | |
Linux Kernel | =6.14-rc4 | |
Linux Kernel | =6.14-rc5 | |
Linux Kernel | =6.14-rc6 | |
Linux Kernel | =6.14-rc7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-21997 is considered a high-severity vulnerability due to the potential for integer overflow leading to system instability.
To fix CVE-2025-21997, you should update to the latest version of the Linux kernel where the vulnerability has been patched.
CVE-2025-21997 affects the Linux kernel, impacting systems that utilize vulnerable versions.
CVE-2025-21997 is an integer overflow vulnerability in the Linux kernel's xsk module.
CVE-2025-21997 may allow local user privileges to escalate, but it is not typically exploited remotely.