In the Linux kernel, the following vulnerability has been resolved:
ipv6: mcast: extend RCU protection in igmp6_send()
igmp6_send() can be called without RTNL or RCU being held.
Extend RCU protection so that we can safely fetch the net pointer
and avoid a potential UAF.
Note that we no longer can use sock_alloc_send_skb() because
ipv6.igmp_sk uses GFP_KERNEL allocations which can sleep.
Instead use alloc_skb() and charge the net->ipv6.igmp_sk
socket under RCU protection.
References
Configurations
Configuration 1 (hide)
|
History
24 Mar 2025, 17:33
Type | Values Removed | Values Added |
---|---|---|
First Time |
Linux linux Kernel
Linux |
|
References | () https://git.kernel.org/stable/c/087c1faa594fa07a66933d750c0b2610aa1a2946 - Patch | |
References | () https://git.kernel.org/stable/c/0bf8e2f3768629d437a32cb824149e6e98254381 - Patch | |
References | () https://git.kernel.org/stable/c/81b25a07ebf53f9ef4ca8f3d96a8ddb94561dd5a - Patch | |
References | () https://git.kernel.org/stable/c/8e92d6a413feaf968a33f0b439ecf27404407458 - Patch | |
Summary |
|
|
CPE | cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:* |
27 Feb 2025, 18:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-416 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
27 Feb 2025, 03:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-27 03:15
Updated : 2025-03-24 17:33
NVD link : CVE-2025-21759
Mitre link : CVE-2025-21759
CVE.ORG link : CVE-2025-21759
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-416
Use After Free