๐Ÿ” CVE Alert

CVE-2025-21687

UNKNOWN 0.0

vfio/platform: check the bounds of read/write syscalls

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: vfio/platform: check the bounds of read/write syscalls count and offset are passed from user space and not checked, only offset is capped to 40 bits, which can be used to read/write out of bounds of the device.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Feb 10, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
6e3f264560099869f68830cb14b3b3e71e5ac76a < f21636f24b6786c8b13f1af4319fa75ffcf17f38 6e3f264560099869f68830cb14b3b3e71e5ac76a < 9377cdc118cf327248f1a9dde7b87de067681dc9 6e3f264560099869f68830cb14b3b3e71e5ac76a < d19a8650fd3d7aed8d1af1d9a77f979a8430eba1 6e3f264560099869f68830cb14b3b3e71e5ac76a < ed81d82bb6e9df3a137f2c343ed689e6c68268ef 6e3f264560099869f68830cb14b3b3e71e5ac76a < 92340e6c5122d823ad064984ef7513eba9204048 6e3f264560099869f68830cb14b3b3e71e5ac76a < f65ce06387f8c1fb54bd59e18a8428248ec68eaf 6e3f264560099869f68830cb14b3b3e71e5ac76a < 6bcb8a5b70b80143db9bf12dfa7d53636f824d53 6e3f264560099869f68830cb14b3b3e71e5ac76a < 1485932496a1b025235af8aa1e21988d6b7ccd54 6e3f264560099869f68830cb14b3b3e71e5ac76a < c981c32c38af80737a2fedc16e270546d139ccdd 6e3f264560099869f68830cb14b3b3e71e5ac76a < a20fcaa230f7472456d12cf761ed13938e320ac3 6e3f264560099869f68830cb14b3b3e71e5ac76a < 665cfd1083866f87301bbd232cb8ba48dcf4acce 6e3f264560099869f68830cb14b3b3e71e5ac76a < ce9ff21ea89d191e477a02ad7eabf4f996b80a69
Linux / Linux
4.1

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/f21636f24b6786c8b13f1af4319fa75ffcf17f38 git.kernel.org: https://git.kernel.org/stable/c/9377cdc118cf327248f1a9dde7b87de067681dc9 git.kernel.org: https://git.kernel.org/stable/c/d19a8650fd3d7aed8d1af1d9a77f979a8430eba1 git.kernel.org: https://git.kernel.org/stable/c/ed81d82bb6e9df3a137f2c343ed689e6c68268ef git.kernel.org: https://git.kernel.org/stable/c/92340e6c5122d823ad064984ef7513eba9204048 git.kernel.org: https://git.kernel.org/stable/c/f65ce06387f8c1fb54bd59e18a8428248ec68eaf git.kernel.org: https://git.kernel.org/stable/c/6bcb8a5b70b80143db9bf12dfa7d53636f824d53 git.kernel.org: https://git.kernel.org/stable/c/1485932496a1b025235af8aa1e21988d6b7ccd54 git.kernel.org: https://git.kernel.org/stable/c/c981c32c38af80737a2fedc16e270546d139ccdd git.kernel.org: https://git.kernel.org/stable/c/a20fcaa230f7472456d12cf761ed13938e320ac3 git.kernel.org: https://git.kernel.org/stable/c/665cfd1083866f87301bbd232cb8ba48dcf4acce git.kernel.org: https://git.kernel.org/stable/c/ce9ff21ea89d191e477a02ad7eabf4f996b80a69 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html