CVE-2025-21687

In the Linux kernel, the following vulnerability has been resolved: vfio/platform: check the bounds of read/write syscalls count and offset are passed from user space and not checked, only offset is capped to 40 bits, which can be used to read/write out of bounds of the device.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc7:*:*:*:*:*:*

History

13 Mar 2025, 13:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/9377cdc118cf327248f1a9dde7b87de067681dc9 -
  • () https://git.kernel.org/stable/c/ed81d82bb6e9df3a137f2c343ed689e6c68268ef -
  • () https://git.kernel.org/stable/c/f65ce06387f8c1fb54bd59e18a8428248ec68eaf -

21 Feb 2025, 16:49

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
References () https://git.kernel.org/stable/c/1485932496a1b025235af8aa1e21988d6b7ccd54 - () https://git.kernel.org/stable/c/1485932496a1b025235af8aa1e21988d6b7ccd54 - Patch
References () https://git.kernel.org/stable/c/665cfd1083866f87301bbd232cb8ba48dcf4acce - () https://git.kernel.org/stable/c/665cfd1083866f87301bbd232cb8ba48dcf4acce - Patch
References () https://git.kernel.org/stable/c/6bcb8a5b70b80143db9bf12dfa7d53636f824d53 - () https://git.kernel.org/stable/c/6bcb8a5b70b80143db9bf12dfa7d53636f824d53 - Patch
References () https://git.kernel.org/stable/c/92340e6c5122d823ad064984ef7513eba9204048 - () https://git.kernel.org/stable/c/92340e6c5122d823ad064984ef7513eba9204048 - Patch
References () https://git.kernel.org/stable/c/a20fcaa230f7472456d12cf761ed13938e320ac3 - () https://git.kernel.org/stable/c/a20fcaa230f7472456d12cf761ed13938e320ac3 - Patch
References () https://git.kernel.org/stable/c/c981c32c38af80737a2fedc16e270546d139ccdd - () https://git.kernel.org/stable/c/c981c32c38af80737a2fedc16e270546d139ccdd - Patch
References () https://git.kernel.org/stable/c/ce9ff21ea89d191e477a02ad7eabf4f996b80a69 - () https://git.kernel.org/stable/c/ce9ff21ea89d191e477a02ad7eabf4f996b80a69 - Patch
References () https://git.kernel.org/stable/c/d19a8650fd3d7aed8d1af1d9a77f979a8430eba1 - () https://git.kernel.org/stable/c/d19a8650fd3d7aed8d1af1d9a77f979a8430eba1 - Patch
References () https://git.kernel.org/stable/c/f21636f24b6786c8b13f1af4319fa75ffcf17f38 - () https://git.kernel.org/stable/c/f21636f24b6786c8b13f1af4319fa75ffcf17f38 - Patch
First Time Linux linux Kernel
Linux
CWE CWE-125
CWE-787
CPE cpe:2.3:o:linux:linux_kernel:6.13:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:*

21 Feb 2025, 14:15

Type Values Removed Values Added
References
  • {'url': 'https://git.kernel.org/stable/c/03844b1908114680ca35fa0a0aba3d906a6d78af', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}
  • {'url': 'https://git.kernel.org/stable/c/198090eb6f5f094cf3a268c3c30ef1e9c84a6dbe', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}
  • {'url': 'https://git.kernel.org/stable/c/61ba518195d61c38c6cb86f83135e51f93735442', 'source': '416baaa9-dc9f-4396-8d5f-8c081fb06d67'}
  • () https://git.kernel.org/stable/c/1485932496a1b025235af8aa1e21988d6b7ccd54 -

17 Feb 2025, 12:15

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: vfio/platform: comprueba que los límites de las llamadas al sistema de lectura/escritura count y offset se pasan desde el espacio del usuario y no se comprueban, solo offset está limitado a 40 bits, que se pueden usar para leer/escribir fuera de los límites del dispositivo.
References
  • () https://git.kernel.org/stable/c/03844b1908114680ca35fa0a0aba3d906a6d78af -
  • () https://git.kernel.org/stable/c/198090eb6f5f094cf3a268c3c30ef1e9c84a6dbe -
  • () https://git.kernel.org/stable/c/61ba518195d61c38c6cb86f83135e51f93735442 -

10 Feb 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-10 16:15

Updated : 2025-03-13 13:15


NVD link : CVE-2025-21687

Mitre link : CVE-2025-21687

CVE.ORG link : CVE-2025-21687


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-125

Out-of-bounds Read

CWE-787

Out-of-bounds Write