CVE-2025-21997

Source
https://cve.org/CVERecord?id=CVE-2025-21997
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-21997.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-21997
Downstream
Related
Published
2025-04-03T07:19:00.583Z
Modified
2026-03-20T12:41:16.475216Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
xsk: fix an integer overflow in xp_create_and_assign_umem()
Details

In the Linux kernel, the following vulnerability has been resolved:

xsk: fix an integer overflow in xpcreateandassignumem()

Since the i and pool->chunk_size variables are of type 'u32', their product can wrap around and then be cast to 'u64'. This can lead to two different XDP buffers pointing to the same memory area.

Found by InfoTeCS on behalf of Linux Verification Center (linuxtesting.org) with SVACE.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/21xxx/CVE-2025-21997.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
94033cd8e73b8632bab7c8b7bb54caa4f5616db7
Fixed
205649d642a5b376724f04f3a5b3586815e43d3b
Fixed
b7b4be1fa43294b50b22e812715198629806678a
Fixed
130290f44bce0eead2b827302109afc3fe189ddd
Fixed
c7670c197b0f1a8726ad5c87bc2bf001a1fc1bbd
Fixed
559847f56769037e5b2e0474d3dbff985b98083d

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-21997.json"