CVE-2025-21761

In the Linux kernel, the following vulnerability has been resolved: openvswitch: use RCU protection in ovs_vport_cmd_fill_info() ovs_vport_cmd_fill_info() can be called without RTNL or RCU. Use RCU protection and dev_net_rcu() to avoid potential UAF.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*

History

24 Mar 2025, 17:46

Type Values Removed Values Added
First Time Linux linux Kernel
Linux
CPE cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/5828937742af74666192835d657095d95c53dbd0 - () https://git.kernel.org/stable/c/5828937742af74666192835d657095d95c53dbd0 - Patch
References () https://git.kernel.org/stable/c/7e01abc34e87abd091e619161a20f54ed4e3e2da - () https://git.kernel.org/stable/c/7e01abc34e87abd091e619161a20f54ed4e3e2da - Patch
References () https://git.kernel.org/stable/c/8ec57509c36c8b9a23e50b7858dda0c520a2d074 - () https://git.kernel.org/stable/c/8ec57509c36c8b9a23e50b7858dda0c520a2d074 - Patch
References () https://git.kernel.org/stable/c/90b2f49a502fa71090d9f4fe29a2f51fe5dff76d - () https://git.kernel.org/stable/c/90b2f49a502fa71090d9f4fe29a2f51fe5dff76d - Patch
References () https://git.kernel.org/stable/c/a849a10de5e04d798f7f286a2f1ca174719a617a - () https://git.kernel.org/stable/c/a849a10de5e04d798f7f286a2f1ca174719a617a - Patch
References () https://git.kernel.org/stable/c/a8816b3f1f151373fd30f1996f00480126c8bb11 - () https://git.kernel.org/stable/c/a8816b3f1f151373fd30f1996f00480126c8bb11 - Patch
References () https://git.kernel.org/stable/c/a884f57600e463f69d7b279c4598b865260b62a1 - () https://git.kernel.org/stable/c/a884f57600e463f69d7b279c4598b865260b62a1 - Patch
References () https://git.kernel.org/stable/c/e85a25d1a9985645e796039e843d1de581d2de1e - () https://git.kernel.org/stable/c/e85a25d1a9985645e796039e843d1de581d2de1e - Patch

13 Mar 2025, 13:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/a8816b3f1f151373fd30f1996f00480126c8bb11 -
  • () https://git.kernel.org/stable/c/a884f57600e463f69d7b279c4598b865260b62a1 -
  • () https://git.kernel.org/stable/c/e85a25d1a9985645e796039e843d1de581d2de1e -
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: openvswitch: usar la protección RCU en ovs_vport_cmd_fill_info() ovs_vport_cmd_fill_info() se puede llamar sin RTNL o RCU. Use la protección RCU y dev_net_rcu() para evitar posibles UAF.

27 Feb 2025, 18:15

Type Values Removed Values Added
CWE CWE-416
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8

27 Feb 2025, 03:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-27 03:15

Updated : 2025-03-24 17:46


NVD link : CVE-2025-21761

Mitre link : CVE-2025-21761

CVE.ORG link : CVE-2025-21761


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free