๐Ÿ” CVE Alert

CVE-2025-21804

UNKNOWN 0.0

PCI: rcar-ep: Fix incorrect variable used when calling devm_request_mem_region()

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: PCI: rcar-ep: Fix incorrect variable used when calling devm_request_mem_region() The rcar_pcie_parse_outbound_ranges() uses the devm_request_mem_region() macro to request a needed resource. A string variable that lives on the stack is then used to store a dynamically computed resource name, which is then passed on as one of the macro arguments. This can lead to undefined behavior. Depending on the current contents of the memory, the manifestations of errors may vary. One possible output may be as follows: $ cat /proc/iomem 30000000-37ffffff : 38000000-3fffffff : Sometimes, garbage may appear after the colon. In very rare cases, if no NULL-terminator is found in memory, the system might crash because the string iterator will overrun which can lead to access of unmapped memory above the stack. Thus, fix this by replacing outbound_name with the name of the previously requested resource. With the changes applied, the output will be as follows: $ cat /proc/iomem 30000000-37ffffff : memory2 38000000-3fffffff : memory3 [kwilczynski: commit log]

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Feb 27, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
2a6d0d63d99956a66f6605832f11755d74a41951 < 7a47e14c5fb0b6dba7073be7b0119fb8fe864e01 2a6d0d63d99956a66f6605832f11755d74a41951 < 6987e021b64cbb49981d140bb72d9d1466f191c4 2a6d0d63d99956a66f6605832f11755d74a41951 < 24576899c49509c0d533bcf569139f691d8f7af7 2a6d0d63d99956a66f6605832f11755d74a41951 < 2c54b9fca1755e80a343ccfde0652dc5ea4744b2 2a6d0d63d99956a66f6605832f11755d74a41951 < 9ff46b0bfeb6e0724a4ace015aa7a0b887cdb7c1 2a6d0d63d99956a66f6605832f11755d74a41951 < 44708208c2a4b828a57a2abe7799c9d3962e7eaa 2a6d0d63d99956a66f6605832f11755d74a41951 < 2d2da5a4c1b4509f6f7e5a8db015cd420144beb4
Linux / Linux
5.8

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/7a47e14c5fb0b6dba7073be7b0119fb8fe864e01 git.kernel.org: https://git.kernel.org/stable/c/6987e021b64cbb49981d140bb72d9d1466f191c4 git.kernel.org: https://git.kernel.org/stable/c/24576899c49509c0d533bcf569139f691d8f7af7 git.kernel.org: https://git.kernel.org/stable/c/2c54b9fca1755e80a343ccfde0652dc5ea4744b2 git.kernel.org: https://git.kernel.org/stable/c/9ff46b0bfeb6e0724a4ace015aa7a0b887cdb7c1 git.kernel.org: https://git.kernel.org/stable/c/44708208c2a4b828a57a2abe7799c9d3962e7eaa git.kernel.org: https://git.kernel.org/stable/c/2d2da5a4c1b4509f6f7e5a8db015cd420144beb4 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/03/msg00028.html