{"uuid": "e60eb876-f5f6-4b79-81cd-96e4670c7e1e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-21711", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/5643", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-21711\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nnet/rose: prevent integer overflows in rose_setsockopt()\n\nIn case of possible unpredictably large arguments passed to\nrose_setsockopt() and multiplied by extra values on top of that,\ninteger overflows may occur.\n\nDo the safest minimum and fix these issues by checking the\ncontents of 'opt' and returning -EINVAL if they are too large. Also,\nswitch to unsigned int and remove useless check for negative 'opt'\nin ROSE_IDLE case.\n\ud83d\udccf Published: 2025-02-27T02:07:23.746Z\n\ud83d\udccf Modified: 2025-02-27T02:07:23.746Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/9bdee49ad6bbd26ab5e13cc6731e54fb1b6c1dca\n2. https://git.kernel.org/stable/c/352daa50946c3bbb662432e8daf54d6760796589\n3. https://git.kernel.org/stable/c/d08f4074f9c69f7e95502587eb1b258a965ba7f0\n4. https://git.kernel.org/stable/c/e5338930a29d0ab2a5af402f5f664aeba0d1a676\n5. https://git.kernel.org/stable/c/d640627663bfe7d8963c7615316d7d4ef60f3b0b", "creation_timestamp": "2025-02-27T02:25:31.000000Z"}