U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2025-21785 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: arm64: cacheinfo: Avoid out-of-bounds write to cacheinfo array The loop that detects/populates cache information already has a bounds check on the array size but does not account for cache levels with separate data/instructions cache. Fix this by incrementing the index for any populated leaf (instead of any populated level).


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 3.x Severity and Vector Strings:

NIST CVSS score
NIST: NVD
Base Score:  7.8 HIGH
Vector:  CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource
https://git.kernel.org/stable/c/4371ac7b494e933fffee2bd6265d18d73c4f05aa
https://git.kernel.org/stable/c/4ff25f0b18d1d0174c105e4620428bcdc1213860 Mailing List  Patch 
https://git.kernel.org/stable/c/67b99a2b5811df4294c2ad50f9bff3b6a08bd618 Mailing List  Patch 
https://git.kernel.org/stable/c/715eb1af64779e1b1aa0a7b2ffb81414d9f708e5 Mailing List  Patch 
https://git.kernel.org/stable/c/875d742cf5327c93cba1f11e12b08d3cce7a88d2 Mailing List  Patch 
https://git.kernel.org/stable/c/88a3e6afaf002250220793df99404977d343db14
https://git.kernel.org/stable/c/ab90894f33c15b14c1cee6959ab6c8dcb09127f8 Mailing List  Patch 
https://git.kernel.org/stable/c/e4fde33107351ec33f1a64188612fbc6ca659284

Weakness Enumeration

CWE-ID CWE Name Source
CWE-787 Out-of-bounds Write cwe source acceptance level NIST  

Known Affected Software Configurations Switch to CPE 2.2

Configuration 1 ( hide )
 cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
   Show Matching CPE(s)
From (including)
4.0
Up to (excluding)
6.1.129
 cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
   Show Matching CPE(s)
From (including)
6.2
Up to (excluding)
6.6.79
 cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
   Show Matching CPE(s)
From (including)
6.7
Up to (excluding)
6.12.16
 cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
   Show Matching CPE(s)
From (including)
6.13
Up to (excluding)
6.13.4
 cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*
   Show Matching CPE(s)
 cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*
   Show Matching CPE(s)

Denotes Vulnerable Software
Are we missing a CPE here? Please let us know.

Change History

3 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2025-21785
NVD Published Date:
02/26/2025
NVD Last Modified:
03/13/2025
Source:
kernel.org