{"uuid": "b0f61f53-e4aa-4a43-921a-6004381d8c56", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-21997", "type": "seen", "source": "https://t.me/cvedetector/21957", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-21997 - Linux Kernel xsk Integer Overflow Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-21997 \nPublished : April 3, 2025, 8:15 a.m. | 38\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nxsk: fix an integer overflow in xp_create_and_assign_umem()  \n  \nSince the i and pool-&gt;chunk_size variables are of type 'u32',  \ntheir product can wrap around and then be cast to 'u64'.  \nThis can lead to two different XDP buffers pointing to the same  \nmemory area.  \n  \nFound by InfoTeCS on behalf of Linux Verification Center  \n(linuxtesting.org) with SVACE. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-03T11:03:14.000000Z"}