CVE-2025-21804
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
27/02/2025
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
PCI: rcar-ep: Fix incorrect variable used when calling devm_request_mem_region()<br />
<br />
The rcar_pcie_parse_outbound_ranges() uses the devm_request_mem_region()<br />
macro to request a needed resource. A string variable that lives on the<br />
stack is then used to store a dynamically computed resource name, which<br />
is then passed on as one of the macro arguments. This can lead to<br />
undefined behavior.<br />
<br />
Depending on the current contents of the memory, the manifestations of<br />
errors may vary. One possible output may be as follows:<br />
<br />
$ cat /proc/iomem<br />
30000000-37ffffff :<br />
38000000-3fffffff :<br />
<br />
Sometimes, garbage may appear after the colon.<br />
<br />
In very rare cases, if no NULL-terminator is found in memory, the system<br />
might crash because the string iterator will overrun which can lead to<br />
access of unmapped memory above the stack.<br />
<br />
Thus, fix this by replacing outbound_name with the name of the previously<br />
requested resource. With the changes applied, the output will be as<br />
follows:<br />
<br />
$ cat /proc/iomem<br />
30000000-37ffffff : memory2<br />
38000000-3fffffff : memory3<br />
<br />
[kwilczynski: commit log]
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.8 (including) | 5.10.235 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.179 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.129 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.76 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.13 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.13.2 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/24576899c49509c0d533bcf569139f691d8f7af7
- https://git.kernel.org/stable/c/2c54b9fca1755e80a343ccfde0652dc5ea4744b2
- https://git.kernel.org/stable/c/2d2da5a4c1b4509f6f7e5a8db015cd420144beb4
- https://git.kernel.org/stable/c/44708208c2a4b828a57a2abe7799c9d3962e7eaa
- https://git.kernel.org/stable/c/6987e021b64cbb49981d140bb72d9d1466f191c4
- https://git.kernel.org/stable/c/7a47e14c5fb0b6dba7073be7b0119fb8fe864e01
- https://git.kernel.org/stable/c/9ff46b0bfeb6e0724a4ace015aa7a0b887cdb7c1
- https://lists.debian.org/debian-lts-announce/2025/03/msg00028.html
- https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html



