Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2025-21997


In the Linux kernel, the following vulnerability has been resolved: xsk: fix an integer overflow in xp_create_and_assign_umem() Since the i and pool->chunk_size variables are of type 'u32', their product can wrap around and then be cast to 'u64'. This can lead to two different XDP buffers pointing to the same memory area. Found by InfoTeCS on behalf of Linux Verification Center (linuxtesting.org) with SVACE.


Published

2025-04-03T08:15:15.127

Last Modified

2025-11-03T20:17:35.820

Status

Modified

Source

416baaa9-dc9f-4396-8d5f-8c081fb06d67

Severity

CVSSv3.1: 5.5 (MEDIUM)

Weaknesses
  • Type: Primary
    CWE-190
  • Type: Secondary
    CWE-190

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System linux linux_kernel < 6.1.132 Yes
Operating System linux linux_kernel < 6.6.85 Yes
Operating System linux linux_kernel < 6.12.21 Yes
Operating System linux linux_kernel < 6.13.9 Yes
Operating System linux linux_kernel 6.14 Yes
Operating System linux linux_kernel 6.14 Yes
Operating System linux linux_kernel 6.14 Yes
Operating System linux linux_kernel 6.14 Yes
Operating System linux linux_kernel 6.14 Yes
Operating System linux linux_kernel 6.14 Yes
Operating System linux linux_kernel 6.14 Yes

References