U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2025-21772 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: partitions: mac: fix handling of bogus partition table Fix several issues in partition probing: - The bailout for a bad partoffset must use put_dev_sector(), since the preceding read_part_sector() succeeded. - If the partition table claims a silly sector size like 0xfff bytes (which results in partition table entries straddling sector boundaries), bail out instead of accessing out-of-bounds memory. - We must not assume that the partition table contains proper NUL termination - use strnlen() and strncmp() instead of strlen() and strcmp().


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource
https://git.kernel.org/stable/c/213ba5bd81b7e97ac6e6190b8f3bc6ba76123625
https://git.kernel.org/stable/c/27a39d006f85e869be68c1d5d2ce05e5d6445bf5
https://git.kernel.org/stable/c/40a35d14f3c0dc72b689061ec72fc9b193f37d1f
https://git.kernel.org/stable/c/6578717ebca91678131d2b1f4ba4258e60536e9f
https://git.kernel.org/stable/c/7fa9706722882f634090bfc9af642bf9ed719e27
https://git.kernel.org/stable/c/80e648042e512d5a767da251d44132553fe04ae0
https://git.kernel.org/stable/c/92527100be38ede924768f4277450dfe8a40e16b
https://git.kernel.org/stable/c/a3e77da9f843e4ab93917d30c314f0283e28c124

Weakness Enumeration

CWE-ID CWE Name Source

Change History

2 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2025-21772
NVD Published Date:
02/26/2025
NVD Last Modified:
03/13/2025
Source:
kernel.org