CVE-2025-21785

In the Linux kernel, the following vulnerability has been resolved: arm64: cacheinfo: Avoid out-of-bounds write to cacheinfo array The loop that detects/populates cache information already has a bounds check on the array size but does not account for cache levels with separate data/instructions cache. Fix this by incrementing the index for any populated leaf (instead of any populated level).
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*

History

13 Mar 2025, 13:15

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: arm64: cacheinfo: evitar escritura fuera de los límites en la matriz cacheinfo El bucle que detecta/completa la información de caché ya tiene una comprobación de los límites en el tamaño de la matriz, pero no tiene en cuenta los niveles de caché con caché de datos/instrucciones independiente. Solucione esto incrementando el índice de cualquier hoja completada (en lugar de cualquier nivel completo).
CPE cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux linux Kernel
Linux
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
References
  • () https://git.kernel.org/stable/c/4371ac7b494e933fffee2bd6265d18d73c4f05aa -
  • () https://git.kernel.org/stable/c/88a3e6afaf002250220793df99404977d343db14 -
  • () https://git.kernel.org/stable/c/e4fde33107351ec33f1a64188612fbc6ca659284 -
References () https://git.kernel.org/stable/c/4ff25f0b18d1d0174c105e4620428bcdc1213860 - () https://git.kernel.org/stable/c/4ff25f0b18d1d0174c105e4620428bcdc1213860 - Mailing List, Patch
References () https://git.kernel.org/stable/c/67b99a2b5811df4294c2ad50f9bff3b6a08bd618 - () https://git.kernel.org/stable/c/67b99a2b5811df4294c2ad50f9bff3b6a08bd618 - Mailing List, Patch
References () https://git.kernel.org/stable/c/715eb1af64779e1b1aa0a7b2ffb81414d9f708e5 - () https://git.kernel.org/stable/c/715eb1af64779e1b1aa0a7b2ffb81414d9f708e5 - Mailing List, Patch
References () https://git.kernel.org/stable/c/875d742cf5327c93cba1f11e12b08d3cce7a88d2 - () https://git.kernel.org/stable/c/875d742cf5327c93cba1f11e12b08d3cce7a88d2 - Mailing List, Patch
References () https://git.kernel.org/stable/c/ab90894f33c15b14c1cee6959ab6c8dcb09127f8 - () https://git.kernel.org/stable/c/ab90894f33c15b14c1cee6959ab6c8dcb09127f8 - Mailing List, Patch
CWE CWE-787

27 Feb 2025, 03:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-27 03:15

Updated : 2025-03-13 13:15


NVD link : CVE-2025-21785

Mitre link : CVE-2025-21785

CVE.ORG link : CVE-2025-21785


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-787

Out-of-bounds Write