CVE-2025-21711
net/rose: prevent integer overflows in rose_setsockopt()
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: net/rose: prevent integer overflows in rose_setsockopt() In case of possible unpredictably large arguments passed to rose_setsockopt() and multiplied by extra values on top of that, integer overflows may occur. Do the safest minimum and fix these issues by checking the contents of 'opt' and returning -EINVAL if they are too large. Also, switch to unsigned int and remove useless check for negative 'opt' in ROSE_IDLE case.
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | Feb 27, 2025 |
| Last Updated | May 12, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new unknown vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 4bdd449977e2364a53d0b2a5427e71beb1cd702d 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < b8583b54455cbec2fc038fa32b6700890b369815 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 9bdee49ad6bbd26ab5e13cc6731e54fb1b6c1dca 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 352daa50946c3bbb662432e8daf54d6760796589 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < d08f4074f9c69f7e95502587eb1b258a965ba7f0 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < e5338930a29d0ab2a5af402f5f664aeba0d1a676 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < d640627663bfe7d8963c7615316d7d4ef60f3b0b
Linux / Linux
2.6.12
References
git.kernel.org: https://git.kernel.org/stable/c/4bdd449977e2364a53d0b2a5427e71beb1cd702d git.kernel.org: https://git.kernel.org/stable/c/b8583b54455cbec2fc038fa32b6700890b369815 git.kernel.org: https://git.kernel.org/stable/c/9bdee49ad6bbd26ab5e13cc6731e54fb1b6c1dca git.kernel.org: https://git.kernel.org/stable/c/352daa50946c3bbb662432e8daf54d6760796589 git.kernel.org: https://git.kernel.org/stable/c/d08f4074f9c69f7e95502587eb1b258a965ba7f0 git.kernel.org: https://git.kernel.org/stable/c/e5338930a29d0ab2a5af402f5f664aeba0d1a676 git.kernel.org: https://git.kernel.org/stable/c/d640627663bfe7d8963c7615316d7d4ef60f3b0b lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00028.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-265688.html