Integer Overflow Vulnerability in Linux Kernel Affects Networking Features
CVE-2025-21711

5.5MEDIUM

Key Information:

Vendor

Linux

Status
Vendor
CVE Published:
27 February 2025

What is CVE-2025-21711?

The Linux kernel has a vulnerability in the networking subsystem, specifically within the rose_setsockopt() function. This issue arises from the potential for integer overflows when unexpectedly large arguments are passed. This could lead to unexpected behavior or crashes in the application. The fix includes input validation to ensure that the contents of the 'opt' parameter are within acceptable limits, returning an error if they exceed predefined thresholds. This enhancement not only addresses the integer overflow risk but also updates the data type to unsigned int and removes unnecessary checks for negative values, reinforcing the stability and security of the kernel's networking capabilities.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

Linux 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 4bdd449977e2364a53d0b2a5427e71beb1cd702d

Linux 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2

Linux 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 9bdee49ad6bbd26ab5e13cc6731e54fb1b6c1dca

References

CVSS V3.1

Score:
5.5
Severity:
MEDIUM
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.