CVE-2025-21787

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
27/02/2025
Last modified:
13/03/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> team: better TEAM_OPTION_TYPE_STRING validation<br /> <br /> syzbot reported following splat [1]<br /> <br /> Make sure user-provided data contains one nul byte.<br /> <br /> [1]<br /> BUG: KMSAN: uninit-value in string_nocheck lib/vsprintf.c:633 [inline]<br /> BUG: KMSAN: uninit-value in string+0x3ec/0x5f0 lib/vsprintf.c:714<br /> string_nocheck lib/vsprintf.c:633 [inline]<br /> string+0x3ec/0x5f0 lib/vsprintf.c:714<br /> vsnprintf+0xa5d/0x1960 lib/vsprintf.c:2843<br /> __request_module+0x252/0x9f0 kernel/module/kmod.c:149<br /> team_mode_get drivers/net/team/team_core.c:480 [inline]<br /> team_change_mode drivers/net/team/team_core.c:607 [inline]<br /> team_mode_option_set+0x437/0x970 drivers/net/team/team_core.c:1401<br /> team_option_set drivers/net/team/team_core.c:375 [inline]<br /> team_nl_options_set_doit+0x1339/0x1f90 drivers/net/team/team_core.c:2662<br /> genl_family_rcv_msg_doit net/netlink/genetlink.c:1115 [inline]<br /> genl_family_rcv_msg net/netlink/genetlink.c:1195 [inline]<br /> genl_rcv_msg+0x1214/0x12c0 net/netlink/genetlink.c:1210<br /> netlink_rcv_skb+0x375/0x650 net/netlink/af_netlink.c:2543<br /> genl_rcv+0x40/0x60 net/netlink/genetlink.c:1219<br /> netlink_unicast_kernel net/netlink/af_netlink.c:1322 [inline]<br /> netlink_unicast+0xf52/0x1260 net/netlink/af_netlink.c:1348<br /> netlink_sendmsg+0x10da/0x11e0 net/netlink/af_netlink.c:1892<br /> sock_sendmsg_nosec net/socket.c:718 [inline]<br /> __sock_sendmsg+0x30f/0x380 net/socket.c:733<br /> ____sys_sendmsg+0x877/0xb60 net/socket.c:2573<br /> ___sys_sendmsg+0x28d/0x3c0 net/socket.c:2627<br /> __sys_sendmsg net/socket.c:2659 [inline]<br /> __do_sys_sendmsg net/socket.c:2664 [inline]<br /> __se_sys_sendmsg net/socket.c:2662 [inline]<br /> __x64_sys_sendmsg+0x212/0x3c0 net/socket.c:2662<br /> x64_sys_call+0x2ed6/0x3c30 arch/x86/include/generated/asm/syscalls_64.h:47<br /> do_syscall_x64 arch/x86/entry/common.c:52 [inline]<br /> do_syscall_64+0xcd/0x1e0 arch/x86/entry/common.c:83<br /> entry_SYSCALL_64_after_hwframe+0x77/0x7f

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 3.3 (including) 6.1.129 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.6.79 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.12.16 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.13 (including) 6.13.4 (excluding)
cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*