Integer Overflow Vulnerability in Linux Kernel Affects Networking Features
CVE-2025-21711
Summary
The Linux kernel has a vulnerability in the networking subsystem, specifically within the rose_setsockopt() function. This issue arises from the potential for integer overflows when unexpectedly large arguments are passed. This could lead to unexpected behavior or crashes in the application. The fix includes input validation to ensure that the contents of the 'opt' parameter are within acceptable limits, returning an error if they exceed predefined thresholds. This enhancement not only addresses the integer overflow risk but also updates the data type to unsigned int and removes unnecessary checks for negative values, reinforcing the stability and security of the kernel's networking capabilities.
Affected Version(s)
Linux 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 9bdee49ad6bbd26ab5e13cc6731e54fb1b6c1dca
Linux 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 352daa50946c3bbb662432e8daf54d6760796589
Linux 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
References
Timeline
Vulnerability published
Vulnerability Reserved