CVE-2025-21711

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-21711
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-21711.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-21711
Downstream
Related
Published
2025-02-27T02:07:23.746Z
Modified
2025-11-28T02:35:15.964748Z
Summary
net/rose: prevent integer overflows in rose_setsockopt()
Details

In the Linux kernel, the following vulnerability has been resolved:

net/rose: prevent integer overflows in rose_setsockopt()

In case of possible unpredictably large arguments passed to rose_setsockopt() and multiplied by extra values on top of that, integer overflows may occur.

Do the safest minimum and fix these issues by checking the contents of 'opt' and returning -EINVAL if they are too large. Also, switch to unsigned int and remove useless check for negative 'opt' in ROSE_IDLE case.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/21xxx/CVE-2025-21711.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Fixed
4bdd449977e2364a53d0b2a5427e71beb1cd702d
Fixed
b8583b54455cbec2fc038fa32b6700890b369815
Fixed
9bdee49ad6bbd26ab5e13cc6731e54fb1b6c1dca
Fixed
352daa50946c3bbb662432e8daf54d6760796589
Fixed
d08f4074f9c69f7e95502587eb1b258a965ba7f0
Fixed
e5338930a29d0ab2a5af402f5f664aeba0d1a676
Fixed
d640627663bfe7d8963c7615316d7d4ef60f3b0b

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
2.6.12
Fixed
5.10.235
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.179
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.129
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.76
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.12.13
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.13.2