{"id":"CVE-2025-21687","summary":"vfio/platform: check the bounds of read/write syscalls","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nvfio/platform: check the bounds of read/write syscalls\n\ncount and offset are passed from user space and not checked, only\noffset is capped to 40 bits, which can be used to read/write out of\nbounds of the device.","modified":"2026-03-20T12:40:41.025660Z","published":"2025-02-10T15:58:43.944Z","related":["MGASA-2025-0078","MGASA-2025-0079","SUSE-SU-2025:0784-1","SUSE-SU-2025:0847-1","SUSE-SU-2025:0856-1","SUSE-SU-2025:0955-1","SUSE-SU-2025:20190-1","SUSE-SU-2025:20192-1","SUSE-SU-2025:20260-1","SUSE-SU-2025:20270-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/21xxx/CVE-2025-21687.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/1485932496a1b025235af8aa1e21988d6b7ccd54"},{"type":"WEB","url":"https://git.kernel.org/stable/c/665cfd1083866f87301bbd232cb8ba48dcf4acce"},{"type":"WEB","url":"https://git.kernel.org/stable/c/6bcb8a5b70b80143db9bf12dfa7d53636f824d53"},{"type":"WEB","url":"https://git.kernel.org/stable/c/92340e6c5122d823ad064984ef7513eba9204048"},{"type":"WEB","url":"https://git.kernel.org/stable/c/9377cdc118cf327248f1a9dde7b87de067681dc9"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a20fcaa230f7472456d12cf761ed13938e320ac3"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c981c32c38af80737a2fedc16e270546d139ccdd"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ce9ff21ea89d191e477a02ad7eabf4f996b80a69"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d19a8650fd3d7aed8d1af1d9a77f979a8430eba1"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ed81d82bb6e9df3a137f2c343ed689e6c68268ef"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f21636f24b6786c8b13f1af4319fa75ffcf17f38"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f65ce06387f8c1fb54bd59e18a8428248ec68eaf"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/21xxx/CVE-2025-21687.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-21687"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"6e3f264560099869f68830cb14b3b3e71e5ac76a"},{"fixed":"f21636f24b6786c8b13f1af4319fa75ffcf17f38"},{"fixed":"9377cdc118cf327248f1a9dde7b87de067681dc9"},{"fixed":"d19a8650fd3d7aed8d1af1d9a77f979a8430eba1"},{"fixed":"ed81d82bb6e9df3a137f2c343ed689e6c68268ef"},{"fixed":"92340e6c5122d823ad064984ef7513eba9204048"},{"fixed":"f65ce06387f8c1fb54bd59e18a8428248ec68eaf"},{"fixed":"6bcb8a5b70b80143db9bf12dfa7d53636f824d53"},{"fixed":"1485932496a1b025235af8aa1e21988d6b7ccd54"},{"fixed":"c981c32c38af80737a2fedc16e270546d139ccdd"},{"fixed":"a20fcaa230f7472456d12cf761ed13938e320ac3"},{"fixed":"665cfd1083866f87301bbd232cb8ba48dcf4acce"},{"fixed":"ce9ff21ea89d191e477a02ad7eabf4f996b80a69"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-21687.json"}}],"schema_version":"1.7.5"}