{"id":"CVE-2025-21848","summary":"nfp: bpf: Add check for nfp_app_ctrl_msg_alloc()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nnfp: bpf: Add check for nfp_app_ctrl_msg_alloc()\n\nAdd check for the return value of nfp_app_ctrl_msg_alloc() in\nnfp_bpf_cmsg_alloc() to prevent null pointer dereference.","modified":"2026-05-18T05:59:13.420766085Z","published":"2025-03-12T09:42:04.263Z","related":["ALSA-2025:20518","SUSE-SU-2025:01919-1","SUSE-SU-2025:01951-1","SUSE-SU-2025:01967-1","SUSE-SU-2025:1177-1","SUSE-SU-2025:1178-1","SUSE-SU-2025:1180-1","SUSE-SU-2025:1293-1","SUSE-SU-2025:20190-1","SUSE-SU-2025:20192-1","SUSE-SU-2025:20260-1","SUSE-SU-2025:20270-1","USN-7521-2"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/21xxx/CVE-2025-21848.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://cert-portal.siemens.com/productcert/html/ssa-082556.html"},{"type":"WEB","url":"https://git.kernel.org/stable/c/1358d8e07afdf21d49ca6f00c56048442977e00a"},{"type":"WEB","url":"https://git.kernel.org/stable/c/29ccb1e4040da6ff02b7e64efaa2f8e6bf06020d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/878e7b11736e062514e58f3b445ff343e6705537"},{"type":"WEB","url":"https://git.kernel.org/stable/c/897c32cd763fd11d0b6ed024c52f44d2475bb820"},{"type":"WEB","url":"https://git.kernel.org/stable/c/924b239f9704566e0d86abd894d2d64bd73c11eb"},{"type":"WEB","url":"https://git.kernel.org/stable/c/bd97f60750bb581f07051f98e31dfda59d3a783b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d64c6ca420019712e194fe095b55f87363e22a9a"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e976ea6c5e1b005c64467cbf94a8577aae9c7d81"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/21xxx/CVE-2025-21848.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-21848"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"ff3d43f7568c82b335d7df2d40a31447c3fce10c"},{"fixed":"d64c6ca420019712e194fe095b55f87363e22a9a"},{"fixed":"e976ea6c5e1b005c64467cbf94a8577aae9c7d81"},{"fixed":"924b239f9704566e0d86abd894d2d64bd73c11eb"},{"fixed":"1358d8e07afdf21d49ca6f00c56048442977e00a"},{"fixed":"29ccb1e4040da6ff02b7e64efaa2f8e6bf06020d"},{"fixed":"897c32cd763fd11d0b6ed024c52f44d2475bb820"},{"fixed":"bd97f60750bb581f07051f98e31dfda59d3a783b"},{"fixed":"878e7b11736e062514e58f3b445ff343e6705537"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-21848.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"4.16.0"},{"fixed":"5.4.291"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.5.0"},{"fixed":"5.10.235"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.179"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.130"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.6.80"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.7.0"},{"fixed":"6.12.17"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.13.0"},{"fixed":"6.13.5"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-21848.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}