CVE-2025-21766

In the Linux kernel, the following vulnerability has been resolved: ipv4: use RCU protection in __ip_rt_update_pmtu() __ip_rt_update_pmtu() must use RCU protection to make sure the net structure it reads does not disappear.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.9:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.9:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.9:rc8:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*

History

28 Oct 2025, 21:08

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/139512191bd06f1b496117c76372b2ce372c9a41 - () https://git.kernel.org/stable/c/139512191bd06f1b496117c76372b2ce372c9a41 - Patch
References () https://git.kernel.org/stable/c/4583748b65dee4d61bd50a2214715b4237bc152a - () https://git.kernel.org/stable/c/4583748b65dee4d61bd50a2214715b4237bc152a - Patch
References () https://git.kernel.org/stable/c/9b1766d1ff5fe496aabe9fc5f4e34e53f35c11c4 - () https://git.kernel.org/stable/c/9b1766d1ff5fe496aabe9fc5f4e34e53f35c11c4 - Patch
References () https://git.kernel.org/stable/c/a39f61d212d822b3062d7f70fa0588e50e55664e - () https://git.kernel.org/stable/c/a39f61d212d822b3062d7f70fa0588e50e55664e - Patch
References () https://git.kernel.org/stable/c/ce3c6165fce0f06305c806696882a3ad4b90e33f - () https://git.kernel.org/stable/c/ce3c6165fce0f06305c806696882a3ad4b90e33f - Patch
References () https://git.kernel.org/stable/c/ea07480b23225942208f1b754fea1e7ec486d37e - () https://git.kernel.org/stable/c/ea07480b23225942208f1b754fea1e7ec486d37e - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE NVD-CWE-noinfo
CPE cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.9:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.9:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.9:rc8:*:*:*:*:*:*
First Time Linux linux Kernel
Linux

13 Mar 2025, 13:15

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ipv4: usar protección RCU en __ip_rt_update_pmtu() __ip_rt_update_pmtu() debe usar protección RCU para asegurarse de que la estructura de red que lee no desaparezca.
References
  • () https://git.kernel.org/stable/c/ce3c6165fce0f06305c806696882a3ad4b90e33f -

27 Feb 2025, 03:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-27 03:15

Updated : 2025-10-28 21:08


NVD link : CVE-2025-21766

Mitre link : CVE-2025-21766

CVE.ORG link : CVE-2025-21766


JSON object : View

Products Affected

linux

  • linux_kernel