
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2025-21787 is a vulnerability in the Linux kernel's team driver that was discovered in February 2025. The issue affects multiple versions of the Linux kernel, including versions from 3.3 through 6.13.4, and involves improper validation of string data in the TEAMOPTIONTYPE_STRING functionality (NVD).
The vulnerability stems from insufficient validation of user-provided string data in the team driver's option setting functionality. Specifically, the code failed to properly verify the presence of a null byte terminator in string data, which could lead to memory safety issues. The issue has a CVSS v3.1 score of 7.8 (HIGH), with attack vector being Local (AV:L), attack complexity Low (AC:L), and requiring low privileges (PR:L) (NVD).
The vulnerability could allow a local attacker with low privileges to potentially cause system instability or denial of service through uninitialized memory access. This is particularly evidenced by the KMSAN (Kernel Memory Sanitizer) detection of uninitialized value usage in string handling functions (Kernel Patch).
A fix has been developed and committed to the Linux kernel, which adds additional validation to ensure that user-provided string data contains a null byte terminator. The patch has been backported to multiple stable kernel versions. Users should update to patched kernel versions: 6.13.4 or later, 6.12.16 or later, 6.6.79 or later, or 6.1.129 or later (Kernel Patch).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."