In the Linux kernel, the following vulnerability has been resolved:
openvswitch: use RCU protection in ovs_vport_cmd_fill_info()
ovs_vport_cmd_fill_info() can be called without RTNL or RCU.
Use RCU protection and dev_net_rcu() to avoid potential UAF.
References
Configurations
Configuration 1 (hide)
|
History
24 Mar 2025, 17:46
Type | Values Removed | Values Added |
---|---|---|
First Time |
Linux linux Kernel
Linux |
|
CPE | cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
|
References | () https://git.kernel.org/stable/c/5828937742af74666192835d657095d95c53dbd0 - Patch | |
References | () https://git.kernel.org/stable/c/7e01abc34e87abd091e619161a20f54ed4e3e2da - Patch | |
References | () https://git.kernel.org/stable/c/8ec57509c36c8b9a23e50b7858dda0c520a2d074 - Patch | |
References | () https://git.kernel.org/stable/c/90b2f49a502fa71090d9f4fe29a2f51fe5dff76d - Patch | |
References | () https://git.kernel.org/stable/c/a849a10de5e04d798f7f286a2f1ca174719a617a - Patch | |
References | () https://git.kernel.org/stable/c/a8816b3f1f151373fd30f1996f00480126c8bb11 - Patch | |
References | () https://git.kernel.org/stable/c/a884f57600e463f69d7b279c4598b865260b62a1 - Patch | |
References | () https://git.kernel.org/stable/c/e85a25d1a9985645e796039e843d1de581d2de1e - Patch |
13 Mar 2025, 13:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary |
|
27 Feb 2025, 18:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-416 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
27 Feb 2025, 03:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-27 03:15
Updated : 2025-03-24 17:46
NVD link : CVE-2025-21761
Mitre link : CVE-2025-21761
CVE.ORG link : CVE-2025-21761
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-416
Use After Free