Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: crypto: ecdsa - Harden against integer overflows in DIV_ROUND_UP() Herbert notes that DIV_ROUND_UP() may overflow unnecessarily if an ecdsa implementation's ->key_size() callback returns an unusually large value. Herbert instead suggests (for a division by 8): X / 8 + !!(X & 7) Based on this formula, introduce a generic DIV_ROUND_UP_POW2() macro and use it in lieu of DIV_ROUND_UP() for ->key_size() return values. Additionally, use the macro in ecc_digits_from_bytes(), whose "nbytes" parameter is a ->key_size() return value in some instances, or a user-specified ASN.1 length in the case of ecdsa_get_signature_rs().
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 6.6.70, < 6.6.99 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/921b8167f10708e38080f84e195cdc68a7a561f1Patch
- https://git.kernel.org/stable/c/b16510a530d1e6ab9683f04f8fb34f2e0f538275Patch
- https://git.kernel.org/stable/c/f02f0218be412cff1c844addf58e002071be298bPatch
- https://git.kernel.org/stable/c/f2133b849ff273abddb6da622daddd8f6f6fa448Patch
FAQ
What is CVE-2025-37984?
CVE-2025-37984 is a vulnerability with a CVSS score of 5.5 (MEDIUM). In the Linux kernel, the following vulnerability has been resolved: crypto: ecdsa - Harden against integer overflows in DIV_ROUND_UP() Herbert notes that DIV_ROUND_UP() may overflow unnecessarily if...
How severe is CVE-2025-37984?
CVE-2025-37984 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-37984?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.