{"id":"CVE-2025-21785","summary":"arm64: cacheinfo: Avoid out-of-bounds write to cacheinfo array","details":"In the Linux kernel, the following vulnerability has been resolved:\n\narm64: cacheinfo: Avoid out-of-bounds write to cacheinfo array\n\nThe loop that detects/populates cache information already has a bounds\ncheck on the array size but does not account for cache levels with\nseparate data/instructions cache. Fix this by incrementing the index\nfor any populated leaf (instead of any populated level).","modified":"2026-05-15T11:53:29.510307745Z","published":"2025-02-27T02:18:25.938Z","related":["ALSA-2025:20095","ALSA-2025:3260","ALSA-2025:3264","SUSE-SU-2025:01620-1","SUSE-SU-2025:01627-1","SUSE-SU-2025:01633-1","SUSE-SU-2025:01640-1","SUSE-SU-2025:01919-1","SUSE-SU-2025:1177-1","SUSE-SU-2025:1178-1","SUSE-SU-2025:1180-1","SUSE-SU-2025:1293-1","SUSE-SU-2025:1573-1","SUSE-SU-2025:1574-1","SUSE-SU-2025:20190-1","SUSE-SU-2025:20192-1","SUSE-SU-2025:20260-1","SUSE-SU-2025:20270-1","USN-7521-2"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/21xxx/CVE-2025-21785.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/4371ac7b494e933fffee2bd6265d18d73c4f05aa"},{"type":"WEB","url":"https://git.kernel.org/stable/c/4ff25f0b18d1d0174c105e4620428bcdc1213860"},{"type":"WEB","url":"https://git.kernel.org/stable/c/67b99a2b5811df4294c2ad50f9bff3b6a08bd618"},{"type":"WEB","url":"https://git.kernel.org/stable/c/715eb1af64779e1b1aa0a7b2ffb81414d9f708e5"},{"type":"WEB","url":"https://git.kernel.org/stable/c/875d742cf5327c93cba1f11e12b08d3cce7a88d2"},{"type":"WEB","url":"https://git.kernel.org/stable/c/88a3e6afaf002250220793df99404977d343db14"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ab90894f33c15b14c1cee6959ab6c8dcb09127f8"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e4fde33107351ec33f1a64188612fbc6ca659284"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/03/msg00028.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/21xxx/CVE-2025-21785.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-21785"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"4.0.0"},{"fixed":"5.4.291"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.5.0"},{"fixed":"5.10.235"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.179"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.129"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.6.79"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.7.0"},{"fixed":"6.12.16"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.13.0"},{"fixed":"6.13.4"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-21785.json"}}],"schema_version":"1.7.5"}