• Tenable
  • CVEs
  • Settings
    Links
    Tenable Cloud Tenable Community & Support Tenable University
    Severity
    Theme
  • Tenable
  • Plugins
  • Overview
  • Plugins Pipeline
  • Newest
  • Updated
  • Search
  • Nessus Families
  • WAS Families
  • NNM Families
  • LCE Families
  • Tenable OT Security Families
  • About Plugin Families
  • Release Notes
  • Audits
  • Overview
  • Newest
  • Updated
  • Search Audit Files
  • Search Items
  • References
  • Authorities
  • Documentation
  • Download All Audit Files
  • Indicators
  • Overview
  • Search
  • Indicators of Attack
  • Indicators of Exposure
  • CVEs
  • Overview
  • Newest
  • Updated
  • Search
  • Attack Path Techniques
  • Overview
  • Search
    • Links
    • Tenable Cloud
    • Tenable Community & Support
    • Tenable University
    • Settings
    • Severity
    • Theme
Detections
  • Plugins
  • Overview
  • Plugins Pipeline
  • Release Notes
  • Newest
  • Updated
  • Search
  • Nessus Families
  • WAS Families
  • NNM Families
  • LCE Families
  • Tenable OT Security Families
  • About Plugin Families
  • Audits
  • Overview
  • Newest
  • Updated
  • Search Audit Files
  • Search Items
  • References
  • Authorities
  • Documentation
  • Download All Audit Files
  • Indicators
  • Overview
  • Search
  • Indicators of Attack
  • Indicators of Exposure
Analytics
  • CVEs
  • Overview
  • Newest
  • Updated
  • Search
  • Attack Path Techniques
  • Overview
  • Search
  1. CVEs
  2. CVE-2025-21687
  1. CVEs

CVE-2025-21687

high
  • Information
  • CPEs
  • Plugins

Description

In the Linux kernel, the following vulnerability has been resolved: vfio/platform: check the bounds of read/write syscalls count and offset are passed from user space and not checked, only offset is capped to 40 bits, which can be used to read/write out of bounds of the device.

References

https://git.kernel.org/stable/c/f65ce06387f8c1fb54bd59e18a8428248ec68eaf

https://git.kernel.org/stable/c/f21636f24b6786c8b13f1af4319fa75ffcf17f38

https://git.kernel.org/stable/c/ed81d82bb6e9df3a137f2c343ed689e6c68268ef

https://git.kernel.org/stable/c/d19a8650fd3d7aed8d1af1d9a77f979a8430eba1

https://git.kernel.org/stable/c/ce9ff21ea89d191e477a02ad7eabf4f996b80a69

https://git.kernel.org/stable/c/c981c32c38af80737a2fedc16e270546d139ccdd

https://git.kernel.org/stable/c/a20fcaa230f7472456d12cf761ed13938e320ac3

https://git.kernel.org/stable/c/9377cdc118cf327248f1a9dde7b87de067681dc9

https://git.kernel.org/stable/c/92340e6c5122d823ad064984ef7513eba9204048

https://git.kernel.org/stable/c/6bcb8a5b70b80143db9bf12dfa7d53636f824d53

https://git.kernel.org/stable/c/665cfd1083866f87301bbd232cb8ba48dcf4acce

https://git.kernel.org/stable/c/1485932496a1b025235af8aa1e21988d6b7ccd54

Details

Source: Mitre, NVD

Published: 2025-02-10

Updated: 2025-03-13

Risk Information

CVSS v2

Base Score: 6.8

Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C

Severity: Medium

CVSS v3

Base Score: 7.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Severity: High

EPSS

EPSS: 0.00024

  • Tenable.com
  • Community & Support
  • Documentation
  • Education
  • © 2025 Tenable®, Inc. All Rights Reserved
  • Privacy Policy
  • Legal
  • 508 Compliance