VLAN Device Misconfiguration in Linux Kernel Affects Networking Functions
CVE-2025-21920
Summary
A vulnerability exists within the Linux kernel related to Virtual Local Area Network (VLAN) device initialization. This flaw allows VLAN devices to be improperly created on non-ethernet devices, leading to the potential leakage of sensitive kernel function addresses to user-mode applications. This occurs during the initialization of GARP and MRP applications for the underlying devices, causing out-of-bounds memory access when device address lengths exceed the expected size. The issue is particularly problematic as it can be exploited via specific command sequences, highlighting the necessity for strict device type enforcement during VLAN device creation to maintain kernel integrity.
Affected Version(s)
Linux 22bedad3ce112d5ca1eaf043d4990fa2ed698c87 < 7f1564b2b2072b7aa1ac75350e9560a07c7a44fd
Linux 22bedad3ce112d5ca1eaf043d4990fa2ed698c87
Linux 22bedad3ce112d5ca1eaf043d4990fa2ed698c87 < 0fb7aa04c19eac4417f360a9f7611a60637bdacc
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved