In the Linux kernel, the following vulnerability has been resolved:
nfp: bpf: Add check for nfp_app_ctrl_msg_alloc()
Add check for the return value of nfp_app_ctrl_msg_alloc() in
nfp_bpf_cmsg_alloc() to prevent null pointer dereference.
References
Configurations
Configuration 1 (hide)
|
History
13 Mar 2025, 16:28
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.14:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
CWE | CWE-476 | |
First Time |
Linux linux Kernel
Linux |
|
References | () https://git.kernel.org/stable/c/1358d8e07afdf21d49ca6f00c56048442977e00a - Patch | |
References | () https://git.kernel.org/stable/c/29ccb1e4040da6ff02b7e64efaa2f8e6bf06020d - Patch | |
References | () https://git.kernel.org/stable/c/878e7b11736e062514e58f3b445ff343e6705537 - Patch | |
References | () https://git.kernel.org/stable/c/897c32cd763fd11d0b6ed024c52f44d2475bb820 - Patch | |
References | () https://git.kernel.org/stable/c/924b239f9704566e0d86abd894d2d64bd73c11eb - Patch | |
References | () https://git.kernel.org/stable/c/bd97f60750bb581f07051f98e31dfda59d3a783b - Patch | |
References | () https://git.kernel.org/stable/c/d64c6ca420019712e194fe095b55f87363e22a9a - Patch | |
References | () https://git.kernel.org/stable/c/e976ea6c5e1b005c64467cbf94a8577aae9c7d81 - Patch |
13 Mar 2025, 13:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References |
|
12 Mar 2025, 10:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-12 10:15
Updated : 2025-03-13 16:28
NVD link : CVE-2025-21848
Mitre link : CVE-2025-21848
CVE.ORG link : CVE-2025-21848
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-476
NULL Pointer Dereference