In the Linux kernel, the following vulnerability has been resolved:
ndisc: extend RCU protection in ndisc_send_skb()
ndisc_send_skb() can be called without RTNL or RCU held.
Acquire rcu_read_lock() earlier, so that we can use dev_net_rcu()
and avoid a potential UAF.
References
Configurations
Configuration 1 (hide)
|
History
24 Mar 2025, 17:38
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:* |
|
First Time |
Linux linux Kernel
Linux |
|
References | () https://git.kernel.org/stable/c/04e05112f10354ffc3bb6cc796d553bab161594c - Patch | |
References | () https://git.kernel.org/stable/c/10a1f3fece2f0d23a3a618b72b2b4e6f408ef7d1 - Patch | |
References | () https://git.kernel.org/stable/c/4d576202b90b1b95a7c428a80b536f91b8201bcc - Patch | |
References | () https://git.kernel.org/stable/c/789230e5a8c1097301afc802e242c79bc8835c67 - Patch | |
References | () https://git.kernel.org/stable/c/a9319d800b5701e7f5e3fa71a5b7c4831fc20d6d - Patch | |
References | () https://git.kernel.org/stable/c/ae38982f521621c216fc2f5182cd091f4734641d - Patch | |
References | () https://git.kernel.org/stable/c/e24d225e4cb8cf108bde00b76594499b98f0a74d - Patch | |
References | () https://git.kernel.org/stable/c/ed6ae1f325d3c43966ec1b62ac1459e2b8e45640 - Patch |
13 Mar 2025, 13:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary |
|
27 Feb 2025, 18:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
CWE | CWE-416 |
27 Feb 2025, 03:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-27 03:15
Updated : 2025-03-24 17:38
NVD link : CVE-2025-21760
Mitre link : CVE-2025-21760
CVE.ORG link : CVE-2025-21760
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-416
Use After Free