CVE-2025-21927

Source
https://cve.org/CVERecord?id=CVE-2025-21927
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-21927.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-21927
Downstream
Related
Published
2025-04-01T15:40:58.432Z
Modified
2026-03-11T07:44:09.119946Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
nvme-tcp: fix potential memory corruption in nvme_tcp_recv_pdu()
Details

In the Linux kernel, the following vulnerability has been resolved:

nvme-tcp: fix potential memory corruption in nvmetcprecv_pdu()

nvmetcprecvpdu() doesn't check the validity of the header length. When header digests are enabled, a target might send a packet with an invalid header length (e.g. 255), causing nvmetcpverifyhdgst() to access memory outside the allocated area and cause memory corruptions by overwriting it with the calculated digest.

Fix this by rejecting packets with an unexpected header length.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/21xxx/CVE-2025-21927.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
3f2304f8c6d6ed97849057bd16fee99e434ca796
Fixed
9fbc953d6b38bc824392e01850f0aeee3b348722
Fixed
22b06c89aa6b2d1ecb8aea72edfb9d53af8d5126
Fixed
ad95bab0cd28ed77c2c0d0b6e76e03e031391064

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-21927.json"