CVE-2025-21787
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
27/02/2025
Last modified:
13/03/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
team: better TEAM_OPTION_TYPE_STRING validation<br />
<br />
syzbot reported following splat [1]<br />
<br />
Make sure user-provided data contains one nul byte.<br />
<br />
[1]<br />
BUG: KMSAN: uninit-value in string_nocheck lib/vsprintf.c:633 [inline]<br />
BUG: KMSAN: uninit-value in string+0x3ec/0x5f0 lib/vsprintf.c:714<br />
string_nocheck lib/vsprintf.c:633 [inline]<br />
string+0x3ec/0x5f0 lib/vsprintf.c:714<br />
vsnprintf+0xa5d/0x1960 lib/vsprintf.c:2843<br />
__request_module+0x252/0x9f0 kernel/module/kmod.c:149<br />
team_mode_get drivers/net/team/team_core.c:480 [inline]<br />
team_change_mode drivers/net/team/team_core.c:607 [inline]<br />
team_mode_option_set+0x437/0x970 drivers/net/team/team_core.c:1401<br />
team_option_set drivers/net/team/team_core.c:375 [inline]<br />
team_nl_options_set_doit+0x1339/0x1f90 drivers/net/team/team_core.c:2662<br />
genl_family_rcv_msg_doit net/netlink/genetlink.c:1115 [inline]<br />
genl_family_rcv_msg net/netlink/genetlink.c:1195 [inline]<br />
genl_rcv_msg+0x1214/0x12c0 net/netlink/genetlink.c:1210<br />
netlink_rcv_skb+0x375/0x650 net/netlink/af_netlink.c:2543<br />
genl_rcv+0x40/0x60 net/netlink/genetlink.c:1219<br />
netlink_unicast_kernel net/netlink/af_netlink.c:1322 [inline]<br />
netlink_unicast+0xf52/0x1260 net/netlink/af_netlink.c:1348<br />
netlink_sendmsg+0x10da/0x11e0 net/netlink/af_netlink.c:1892<br />
sock_sendmsg_nosec net/socket.c:718 [inline]<br />
__sock_sendmsg+0x30f/0x380 net/socket.c:733<br />
____sys_sendmsg+0x877/0xb60 net/socket.c:2573<br />
___sys_sendmsg+0x28d/0x3c0 net/socket.c:2627<br />
__sys_sendmsg net/socket.c:2659 [inline]<br />
__do_sys_sendmsg net/socket.c:2664 [inline]<br />
__se_sys_sendmsg net/socket.c:2662 [inline]<br />
__x64_sys_sendmsg+0x212/0x3c0 net/socket.c:2662<br />
x64_sys_call+0x2ed6/0x3c30 arch/x86/include/generated/asm/syscalls_64.h:47<br />
do_syscall_x64 arch/x86/entry/common.c:52 [inline]<br />
do_syscall_64+0xcd/0x1e0 arch/x86/entry/common.c:83<br />
entry_SYSCALL_64_after_hwframe+0x77/0x7f
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 3.3 (including) | 6.1.129 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.79 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.16 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.13.4 (excluding) |
cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/4236bf4716589558cc0f3c3612642b2c2141b04e
- https://git.kernel.org/stable/c/4512482e4805dd30bc77dec511f2a2edba5cb868
- https://git.kernel.org/stable/c/5bef3ac184b5626ea62385d6b82a1992b89d7940
- https://git.kernel.org/stable/c/7c30483d0f6bdb2230e10e3e4be5167927eac7a0
- https://git.kernel.org/stable/c/7f5af50f3aa0af8cbef9fb76fffeed69e8143f59
- https://git.kernel.org/stable/c/8401cade1918281177974b32c925afdce750d292
- https://git.kernel.org/stable/c/d071a91fa614ecdf760c29f61f6a7bfb7df796d6
- https://git.kernel.org/stable/c/f443687ad20c70320d1248f35f57bf46cac8df0a