In the Linux kernel, the following vulnerability has been resolved:
arp: use RCU protection in arp_xmit()
arp_xmit() can be called without RTNL or RCU protection.
Use RCU protection to avoid potential UAF.
References
Configurations
Configuration 1 (hide)
|
History
21 Mar 2025, 18:02
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/01d1b5c9abcaff29a43f1d17a19c33eec92c7dbe - Patch | |
References | () https://git.kernel.org/stable/c/10f555e3f573d004ae9d89b3276abb58c4ede5c3 - Patch | |
References | () https://git.kernel.org/stable/c/2c331718d3389b6c5f6855078ab7171849e016bd - Patch | |
References | () https://git.kernel.org/stable/c/307cd1e2d3cb1cbc6c40c679cada6d7168b18431 - Patch | |
References | () https://git.kernel.org/stable/c/a42b69f692165ec39db42d595f4f65a4c8f42e44 - Patch | |
References | () https://git.kernel.org/stable/c/d9366ac2f956a1948b68c0500f84a3462ff2ed8a - Patch | |
References | () https://git.kernel.org/stable/c/e9f4dee534eb1b225b0a120395ad9bc2afe164d3 - Patch | |
References | () https://git.kernel.org/stable/c/f189654459423d4d48bef2d120b4bfba559e6039 - Patch | |
CPE | cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
|
First Time |
Linux linux Kernel
Linux |
13 Mar 2025, 13:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References |
|
27 Feb 2025, 18:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
CWE | CWE-416 |
27 Feb 2025, 03:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-27 03:15
Updated : 2025-03-21 18:02
NVD link : CVE-2025-21762
Mitre link : CVE-2025-21762
CVE.ORG link : CVE-2025-21762
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-416
Use After Free