In the Linux kernel, the following vulnerability has been resolved:
vrf: use RCU protection in l3mdev_l3_out()
l3mdev_l3_out() can be called without RCU being held:
raw_sendmsg()
ip_push_pending_frames()
ip_send_skb()
ip_local_out()
__ip_local_out()
l3mdev_ip_out()
Add rcu_read_lock() / rcu_read_unlock() pair to avoid
a potential UAF.
References
Configurations
Configuration 1 (hide)
|
History
13 Mar 2025, 21:53
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/022cac1c693add610ae76ede03adf4d9d5a2cf21 - Patch | |
References | () https://git.kernel.org/stable/c/20a3489b396764cc9376e32a9172bee26a89dc3b - Patch | |
References | () https://git.kernel.org/stable/c/5bb4228c32261d06e4fbece37ec3828bcc005b6b - Patch | |
References | () https://git.kernel.org/stable/c/6ccaa5797f5362a2aad6baa6ddaf4715ac2dd51e - Patch | |
References | () https://git.kernel.org/stable/c/6d0ce46a93135d96b7fa075a94a88fe0da8e8773 - Patch | |
References | () https://git.kernel.org/stable/c/7b81425b517accefd46bee854d94954f5c57e019 - Patch | |
References | () https://git.kernel.org/stable/c/c40cb5c03e37552d6eff963187109e2c3f78ef6f - Patch | |
References | () https://git.kernel.org/stable/c/c7574740be8ce68a57d0aece24987b9be2114c3c - Patch | |
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:* |
|
First Time |
Linux
Linux linux Kernel |
13 Mar 2025, 13:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References |
|
27 Feb 2025, 18:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-416 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
27 Feb 2025, 03:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-27 03:15
Updated : 2025-03-13 21:53
NVD link : CVE-2025-21791
Mitre link : CVE-2025-21791
CVE.ORG link : CVE-2025-21791
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-416
Use After Free