CVE-2025-21711

medium

Description

In the Linux kernel, the following vulnerability has been resolved: net/rose: prevent integer overflows in rose_setsockopt() In case of possible unpredictably large arguments passed to rose_setsockopt() and multiplied by extra values on top of that, integer overflows may occur. Do the safest minimum and fix these issues by checking the contents of 'opt' and returning -EINVAL if they are too large. Also, switch to unsigned int and remove useless check for negative 'opt' in ROSE_IDLE case.

References

https://git.kernel.org/stable/c/e5338930a29d0ab2a5af402f5f664aeba0d1a676

https://git.kernel.org/stable/c/d640627663bfe7d8963c7615316d7d4ef60f3b0b

https://git.kernel.org/stable/c/d08f4074f9c69f7e95502587eb1b258a965ba7f0

https://git.kernel.org/stable/c/9bdee49ad6bbd26ab5e13cc6731e54fb1b6c1dca

https://git.kernel.org/stable/c/352daa50946c3bbb662432e8daf54d6760796589

Details

Source: Mitre, NVD

Published: 2025-02-27

Updated: 2025-02-27

Risk Information

CVSS v2

Base Score: 6.6

Vector: CVSS2#AV:L/AC:L/Au:N/C:N/I:C/A:C

Severity: Medium

CVSS v3

Base Score: 5.5

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Severity: Medium