Vulnerability in Linux Kernel Affecting VXLAN Functionality
CVE-2025-21790

Currently unrated

Key Information:

Vendor
Linux
Status
Vendor
CVE Published:
27 February 2025

Summary

A vulnerability has been identified within the Linux Kernel’s VXLAN functionality, where the initialization process fails to properly validate return values from the 'vxlan_vnigroup_init()' function. This oversight can lead to a system crash, primarily due to null pointer dereferences and general protection faults. It is critical to ensure that the success of this initialization is explicitly verified to prevent potential disruptions in network stability. Users are advised to apply the latest kernel updates to mitigate this risk.

Affected Version(s)

Linux f9c4bb0b245cee35ef66f75bf409c9573d934cf9 < 79aea5e55156c87dc570e43fcd8bba01b9d6ab3f

Linux f9c4bb0b245cee35ef66f75bf409c9573d934cf9

Linux f9c4bb0b245cee35ef66f75bf409c9573d934cf9

References

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.