Vulnerability in Linux Kernel Affecting VXLAN Functionality
CVE-2025-21790
Summary
A vulnerability has been identified within the Linux Kernel’s VXLAN functionality, where the initialization process fails to properly validate return values from the 'vxlan_vnigroup_init()' function. This oversight can lead to a system crash, primarily due to null pointer dereferences and general protection faults. It is critical to ensure that the success of this initialization is explicitly verified to prevent potential disruptions in network stability. Users are advised to apply the latest kernel updates to mitigate this risk.
Affected Version(s)
Linux f9c4bb0b245cee35ef66f75bf409c9573d934cf9 < 79aea5e55156c87dc570e43fcd8bba01b9d6ab3f
Linux f9c4bb0b245cee35ef66f75bf409c9573d934cf9
Linux f9c4bb0b245cee35ef66f75bf409c9573d934cf9
References
Timeline
Vulnerability published
Vulnerability Reserved