CVE-2025-21758

In the Linux kernel, the following vulnerability has been resolved: ipv6: mcast: add RCU protection to mld_newpack() mld_newpack() can be called without RTNL or RCU being held. Note that we no longer can use sock_alloc_send_skb() because ipv6.igmp_sk uses GFP_KERNEL allocations which can sleep. Instead use alloc_skb() and charge the net->ipv6.igmp_sk socket under RCU protection.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*

History

28 Oct 2025, 20:50

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux linux Kernel
Linux
CWE NVD-CWE-noinfo
References () https://git.kernel.org/stable/c/1b91c597b0214b1b462eb627ec02658c944623f2 - () https://git.kernel.org/stable/c/1b91c597b0214b1b462eb627ec02658c944623f2 - Patch
References () https://git.kernel.org/stable/c/25195f9d5ffcc8079ad743a50c0409dbdc48d98a - () https://git.kernel.org/stable/c/25195f9d5ffcc8079ad743a50c0409dbdc48d98a - Patch
References () https://git.kernel.org/stable/c/29fa42197f26a97cde29fa8c40beddf44ea5c8f3 - () https://git.kernel.org/stable/c/29fa42197f26a97cde29fa8c40beddf44ea5c8f3 - Patch
References () https://git.kernel.org/stable/c/a527750d877fd334de87eef81f1cb5f0f0ca3373 - () https://git.kernel.org/stable/c/a527750d877fd334de87eef81f1cb5f0f0ca3373 - Patch
References () https://git.kernel.org/stable/c/d60d493b0e65647e0335e6a7c4547abcea7df8e9 - () https://git.kernel.org/stable/c/d60d493b0e65647e0335e6a7c4547abcea7df8e9 - Patch
References () https://git.kernel.org/stable/c/e8af3632a7f2da83e27b083f787bced1faba00b1 - () https://git.kernel.org/stable/c/e8af3632a7f2da83e27b083f787bced1faba00b1 - Patch

13 Mar 2025, 13:15

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ipv6: mcast: agregar protección RCU a mld_newpack() mld_newpack() se puede llamar sin que se mantenga RTNL o RCU. Tenga en cuenta que ya no podemos usar sock_alloc_send_skb() porque ipv6.igmp_sk usa asignaciones GFP_KERNEL que pueden dormir. En su lugar, use alloc_skb() y cargue el socket net->ipv6.igmp_sk bajo la protección RCU.
References
  • () https://git.kernel.org/stable/c/29fa42197f26a97cde29fa8c40beddf44ea5c8f3 -

27 Feb 2025, 03:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-27 03:15

Updated : 2025-10-28 20:50


NVD link : CVE-2025-21758

Mitre link : CVE-2025-21758

CVE.ORG link : CVE-2025-21758


JSON object : View

Products Affected

linux

  • linux_kernel